Find & Identify Your IoT Devices
Detect IoT Vulnerabilities
Plug-n-Play | 100% Automated
Easy as 1-2-3
Request a Free
You Need Get Started
with IoT Security
No Network TAP
No Agents or Tuning
Get Your Report
IoT Security FAQ
The Internet of Things (IoT) is a general category of connected devices that do not necessarily meet the classic description of a computer and are commonly designed for a single purpose. Examples of IoT devices include medical devices, HVAC controllers, door access controllers, IP Cameras, Smart TVs, smart watches, and speakers.
Virtually every network, whether a large corporate intranet or a simple home Wi-Fi network, has IoT devices on it. Most are unknown or unmanaged devices and hard to secure, making it challenging to know what IoT is on the network, where they are, where they are communicating, and whether they are vulnerable. Traditional security tools can’t keep up, making dedicated IoT security solutions a critical piece of any enterprise security strategy.
The Securolytics IoT-mini makes it fast and easy to address common IoT security challenges. The IoT-mini is about 4 square inches (see photo) and runs off USB power connected to any ethernet jack on the network.
We have a limited supply of IoT-minis available. When you request an IoT-mini, we will notify you within 48 hours if we have one available. Once approved, you can expect a simple package with all you need to begin base lining your IoT inventory and security posture. The package includes the IoT-mini, a USB-USB-mini, CAT6 Ethernet cable, and a power brick for the USB cable if there is no USB port to power the device.
Using the IoTmini is as simple as 1-2-3:
The report includes a complete view of IoT devices connected to your network, along with recommendations. To continue receiving monthly update reports, simply leave the IoT-mini connected to the network.
We have a limited supply of IoT-mini available at no charge. The initial IoT assessment and report are currently available free of charge, with discounted and volume pricing available for subsequent months.
The IoTmini will automatically assess any network environment where it’s connected. Currently, there is no limit to the number of network environments that can be assessed.
The IoT-mini is completely automated. When you get your IoT-mini and connect it to the network, it will:
The IoT-mini is also aware of any new devices that connect to the network. When new devices connect, the IoTmini will also begin to profile them to be identified and checked for IoT vulnerabilities.
Also, there are no agents to install, no network TAPs, and there is no tuning.
Unlike many other tools that claim to protect and inventory devices, the IoT-mini uses a proprietary non-intrusive technique called PortSafe™ Inspection. PortSafe™ will not interfere with devices or network performance as it discovers, identifies, and does vulnerability detection on devices.
The IoT-mini profiles devices into categories and device type. Then, it creates a risk profile for each device, including vulnerabilities, flaws, risks, and other crucial information.
Once the IoT-mini connects to a network, it begins inspecting and identifying devices. Within 24-48 hours (depending on the size of the network), the report will be emailed to you automatically each month.
The Securolytics IoT-max is a full enterprise-level solution based on the same proprietary software and techniques that the Securolytics IoT-mini uses.
The primary difference is that the IoT-max can accept logs to enable automated and device-level behavior monitoring.
The IoT-max can also be set up to integrate results with your NAC, SIEM, or other security monitoring tools.
Additionally, the IoT-max relays all of the same information found in the IoT-mini’s report into a real-time dashboard that can be accessed and managed anytime from anywhere.
For have additional questions, email email@example.com