{"id":20054,"date":"2021-11-20T05:13:02","date_gmt":"2021-11-20T05:13:02","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20054"},"modified":"2023-01-20T19:48:03","modified_gmt":"2023-01-20T19:48:03","slug":"iot-security-solutions","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/","title":{"rendered":"Top IoT Security Solutions"},"content":{"rendered":"\n<p>IoT security is where endpoint detection and response (<a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">EDR<\/a>) and enterprise mobility management (<a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-mobility-management\/\">EMM<\/a>) meet the challenges of a rapidly expanding <a href=\"https:\/\/www.esecurityplanet.com\/networks\/edge-security-how-to-secure-the-edge-of-the-network\/\">edge computing<\/a> infrastructure. As the enterprise attack surface grows, IoT is yet another attack vector organizations aren\u2019t fully prepared to defend.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/essential-iot-security-best-practices\/\">Internet of Things (IoT) devices<\/a> are the smart consumer and business systems powering the homes, factories, and enterprise processes of tomorrow. By year-end, total IoT device installations will surpass 35 billion and extend to <a href=\"https:\/\/www.idc.com\/getdoc.jsp?containerId=prAP46737220\" target=\"_blank\" rel=\"noreferrer noopener\">55 billion<\/a> by 2025.<\/p>\n\n\n\n<p>Enterprise organizations recognize this shift and need to invest in device management and endpoint security capabilities. In 2016, $91 million was spent on IoT endpoint security solutions. Five years later, that number has skyrocketed to $631 million. With the growth of segments like <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-protection-physical-cybersecurity\/\">industrial IoT<\/a> (IIoT), Internet of Medical Things (IoMT), and industrial control systems (ICS), IoT security will continue to be critical to business continuity, <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerability management<\/a>, and threat remediation.<\/p>\n\n\n\n<p>This article looks at the top IoT security solutions, current commercial features, associated risks, and considerations for organizations choosing an IoT vendor.<\/p>\n\n\n\n<p><strong>Jump to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#top\">Top IoT Security Vendors and Solutions<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#considerations\">Consideration for Choosing an IoT Security Solution<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#what\">What Are IoT Security Solutions?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#risks\">IoT Device Risks and Vulnerabilities<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#conclusion\">IoT Security: Not Going Away<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"top\">Top IoT Security Vendors and Solutions<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#armis\">Armis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#broadcom\">Broadcom<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#cisco\">Cisco<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#cradlepoint\">Cradlepoint<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#entrust\">Entrust<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#forescout\">Forescout<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#fortinet\">Fortinet<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#jfrog\">JFrog<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#overwatch\">Overwatch<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#pan\">Palo Alto Networks<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#ptc\">PTC<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#trustwave\">Trustwave<\/a><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.Armis_-1024x1024.png\" alt=\"Armis logo\" class=\"wp-image-20068\" width=\"202\" height=\"202\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Armis_-1024x1024.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Armis_-300x300.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Armis_-150x150.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Armis_-768x768.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Armis_-696x696.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Armis_-1068x1068.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Armis_.png 1345w\" sizes=\"(max-width: 202px) 100vw, 202px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"armis\"><strong>Armis<\/strong><\/h3>\n\n\n\n<p>Launched in 2015, Armis Security specializes in providing agentless IoT security for today&#8217;s enterprise infrastructure. The Armis Platform offers the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">behavioral analysis<\/a> of billions of devices to inform the Armis Device Knowledgebase, which monitors and alerts administrators to anomalies in IoT device traffic. With Armis Standard Query (ASQ), operators can search and investigate vulnerabilities, services, and policies for managed and unmanaged devices, applications, and networks. As enterprises increasingly take on risks associated with IoT deployment, Armis Asset Management is the vendor&#8217;s separate solution providing visibility into devices across the hybrid infrastructure.<\/p>\n\n\n\n<p>Armis&#8217; solutions include cybersecurity asset management, OT security, ICS risk assessment, <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust<\/a>, and more. Armis was acquired at a $1 billion price tag by Insight Partners in January 2020, joining Insight&#8217;s other cybersecurity subsidiaries like SentinelOne, Perimeter81, Mimecast, and Tenable.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Armis Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Agentless, passive monitoring for seamless integration into existing infrastructure<\/li>\n\n\n\n<li>Robust device contextual details like model, IP\/MAC address, OS, and username<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">Threat intelligence<\/a> feeds offering detection and response functionality<\/li>\n\n\n\n<li>Monitoring for an array of devices including IoT, industrial, medical, apps, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\">cloud<\/a><\/li>\n\n\n\n<li>Built-in playbooks for manual or automated responses to policy violations<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/threats\/tcp-ip-vulnerabilities-expose-iot-ot-systems\/\">New TCP\/IP Vulnerabilities Expose IoT, OT Systems<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/Broadcom_Symantect_Logo.png\" alt=\"Symantec logo\" class=\"wp-image-18380\" width=\"196\" height=\"196\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/Broadcom_Symantect_Logo.png 400w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/Broadcom_Symantect_Logo-300x300.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/Broadcom_Symantect_Logo-150x150.png 150w\" sizes=\"(max-width: 196px) 100vw, 196px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"broadcom\"><strong>Broadcom Symantec<\/strong><\/h3>\n\n\n\n<p>Considering the IT giant&#8217;s network infrastructure and cybersecurity chops, it&#8217;s no surprise that Broadcom Symantec is also a leader in the IoT security market. Symantec&#8217;s Integrated Cyber Defense security bundles (<a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\">XDR<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sase\/\">SASE<\/a>, and zero trust) contain all the necessary tools for monitoring and securing IoT devices.<\/p>\n\n\n\n<p>Broadcom also offers a location hub microcontroller and System-on-a-Chip (SoC) systems for embedded IoT security for organizations handling product manufacturing. Explicit to the risks posed by IoT deployment, Symantec ICS Protection provides organizations with an enforcement driver, advanced ML, and threat intelligence. At the same time, Symantec CSP offers application <a href=\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/\">allowlisting<\/a>, system hardening, and anti-exploit techniques.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Broadcom Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Embedded IoT security for seamless over-the-air (OTA) management<\/li>\n\n\n\n<li>Powerful analytics engine for processing millions of IoT events<\/li>\n\n\n\n<li>Support for managed and unmanaged devices across hybrid infrastructures<\/li>\n\n\n\n<li>Monitor IoT performance for cloud, <a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-control-api-security-risks\/\">APIs<\/a>, apps, devices, networks, and more<\/li>\n\n\n\n<li>Global threat intelligence informing endpoint policies and provisioning<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.Cisco_-1024x540.png\" alt=\"Cisco logo\" class=\"wp-image-20067\" width=\"199\" height=\"105\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cisco_-1024x540.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cisco_-300x158.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cisco_-768x405.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cisco_-1536x809.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cisco_-2048x1079.png 2048w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cisco_-150x79.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cisco_-696x367.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cisco_-1068x563.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cisco_-1920x1012.png 1920w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cisco\"><strong>Cisco<\/strong><\/h3>\n\n\n\n<p>Enterprise networking vendor Cisco took a big step into the future of industrial security with the acquisition of French IoT company Sentryo, rebranded as Cyber Vision, in 2019. The resultant synergy has been optimal visibility into ICS networks through an adaptive edge monitoring architecture alongside Cisco&#8217;s existing security stack. In addition to Cyber Vision, the Cisco IoT Threat Defense also includes <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">firewalls<\/a>, identity service engines (ISE), secure endpoints, and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soar\/\">SOAR<\/a>.<\/p>\n\n\n\n<p>Cisco&#8217;s industrial threat defense strategy helps organizations assess risk, identify relationships between systems, and deploy <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">microsegmentation<\/a> in the name of zero trust. Security administrators gain needed context into IoT and OT security events to leverage existing policies. The Forrester Wave for ICS Security Solutions released earlier this month for Q4 2021 placed Cisco atop the ICS\/OT security industry.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cisco Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Real-time visibility into industrial assets, communications patterns, and app flows<\/li>\n\n\n\n<li>Seamless integration with SOC platforms and <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">SIEM<\/a> and SOAR systems<\/li>\n\n\n\n<li>Alerts for hardware and software vulnerability detection and response<\/li>\n\n\n\n<li>Deployable as embedded equipment or an out-of-band SPAN collection network<\/li>\n\n\n\n<li>Deep packet inspection (DPI) for understanding context around behavior<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.Cradlepoint-1024x535.jpeg\" alt=\"Cradlepoint logo\" class=\"wp-image-20066\" width=\"242\" height=\"127\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cradlepoint-1024x535.jpeg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cradlepoint-300x157.jpeg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cradlepoint-768x401.jpeg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cradlepoint-150x78.jpeg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cradlepoint-696x364.jpeg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cradlepoint-1068x558.jpeg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Cradlepoint.jpeg 1200w\" sizes=\"(max-width: 242px) 100vw, 242px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cradlepoint\"><strong>Cradlepoint<\/strong><\/h3>\n\n\n\n<p>Since 2006, Cradlepoint has grown into a dominant <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sd-wan-security\/\">WAN<\/a>, edge networking, and cloud solutions provider and was acquired by Ericsson in September 2020 for $1.1 billion. The Boise, Idaho-based vendor\u2019s IoT solution is a part of its NetCloud Service, offering LTE and 5G-compatible wireless edge routers with a web-based platform to manage edge traffic and IoT services.<\/p>\n\n\n\n<p>NetCloud for IoT offers remote management, dynamic routing protocols, zone-based firewalls, and extensibility for securing edge environments. Cradlepoint works with a universe of IoT devices, including medical equipment and smart buildings to kiosks and digital signage.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cradlepoint NetCloud for IoT Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dashboard offering visibility into accounts, groups, devices, usage, and analytics<\/li>\n\n\n\n<li>Connection manager offering WAN optimization, failover, and load balancing<\/li>\n\n\n\n<li>Routing capabilities for static and policy routes, traffic steering, and IP verification<\/li>\n\n\n\n<li>Support for IPv4 and IPv6, Quality of Service (QoS), and IP passthrough mode<\/li>\n\n\n\n<li>Advanced tools like in-band and out-of-band management and map locations<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/5g-cybersecurity\/\">Cybersecurity Risks of 5G&nbsp; \u2013 And How to Control Them<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.Entrust.png\" alt=\"Entrust logo\" class=\"wp-image-20065\" width=\"272\" height=\"130\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Entrust.png 610w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Entrust-300x144.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Entrust-150x72.png 150w\" sizes=\"(max-width: 272px) 100vw, 272px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"entrust\"><strong>Entrust<\/strong><\/h3>\n\n\n\n<p>With five decades of experience working with distributed technology solutions, Entrust is a market leader in certificate issuance, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">identity management<\/a>, and digital security systems trusted globally by governments, banks, and enterprises. Entrust IoT Security relies on the vendor&#8217;s industry-recognized Public Key Infrastructure (PKI) solution. Entrust PKI includes Certificate Hub for granular control of digital certificates, Managed PKI Services to outsource certificate issuance and management, or Entelligence Security Provider for automating enterprise ID management. Entrust can secure the sensitive transactions needed for business continuity for enterprises and industrial organizations deploying IoT devices.<\/p>\n\n\n\n<p>Beyond Entrust&#8217;s comprehensive device management offerings, its explicit edge device management products are IoT Identity Issuance and IoT Identity Management. These agent-based solutions can quickly onboard and configure new IoT devices and facilitate secure communication between apps, users, and appliances.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Entrust Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User-friendly portal for managing certificates from remote locations<\/li>\n\n\n\n<li>Access to key history, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">backups and recovery<\/a> configurations, and more<\/li>\n\n\n\n<li>Secure, automated updates and upgrades with the latest security requirements<\/li>\n\n\n\n<li>Compatibility with leading enterprise mobility management (EMM) solutions<\/li>\n\n\n\n<li>Managed identity security, including <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\">encryption<\/a>, digital signatures, and <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">authentication<\/a><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.Forescout-1.png\" alt=\"Forescout logo\" class=\"wp-image-20064\" width=\"306\" height=\"145\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Forescout-1.png 835w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Forescout-1-300x142.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Forescout-1-768x364.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Forescout-1-150x71.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Forescout-1-696x330.png 696w\" sizes=\"(max-width: 306px) 100vw, 306px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Forescout\"><strong>Forescout<\/strong><\/h3>\n\n\n\n<p>Twenty years after its launch, Forescout is an industry leader in monitoring, analyzing, and securing the IoT and OT systems commonly dubbed the Enterprise of Things. Forescout&#8217;s IoT Security solution recognizes the value of <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-zero-trust\/\">zero trust<\/a> principles and works to establish micro-perimeters for specific network segments, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/phishing-campaign-used-morse-code-to-evade-detection\/\">obfuscation<\/a> techniques, and granular user <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">privileges and access<\/a>.<\/p>\n\n\n\n<p>As a budding zero trust industry leader, the San Jose-based vendor can help manage risk across the hybrid infrastructure, including unmanaged services, Internet of Medical Things (IoMT) devices, and all IP-connected systems. As to how far the vendor has come \u2013 Forescout was acquired last year at a valuation of $1.9 billion by a private equity firm.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Forescout IoT Security Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Provision IoT devices by network segment with dynamic, behavior-based policies<\/li>\n\n\n\n<li>Agentless monitoring that can discover all physical or virtual IP-connected devices<\/li>\n\n\n\n<li>Access to the Forescout Device Cloud with over 12 million device risk profiles<\/li>\n\n\n\n<li>Discover all-IP connected physical and virtual machines in real-time<\/li>\n\n\n\n<li>Automate configuration management database (CMDB) for replication<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.Fortinet.png\" alt=\"Fortinet logo\" class=\"wp-image-20062\" width=\"278\" height=\"139\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Fortinet.png 750w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Fortinet-300x150.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Fortinet-150x75.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Fortinet-696x348.png 696w\" sizes=\"(max-width: 278px) 100vw, 278px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Fortinet\"><strong>Fortinet<\/strong><\/h3>\n\n\n\n<p>Fortinet is addressing the newest frontier of cybersecurity with its FortiGuard IoT Service. With enterprise capacity, FortiGuard IoT processes 1.2 billion queries daily from thousands of new and existing devices. Leaning on its existing security stack, Fortinet&#8217;s strategy for addressing edge risk combines its next-generation firewall (FortiGate) and <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">NAC<\/a> (FortiNAC) in a lightweight SaaS solution. With LAN Edge, organizations can implement their SD-WAN strategy while bolstering edge networks.<\/p>\n\n\n\n<p>FortiNAC is the vendor&#8217;s zero trust access solution providing agentless scanning, microsegmentation, and a multitude of profiling methods to determine the identity of devices. Fortinet firmly believes in a fabric-based approach to IoT security to manage the distributed threat posed by IP-enabled devices.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Fortinet Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Easy, automated onboarding for apps, users, and devices across infrastructure<\/li>\n\n\n\n<li>User and device profiling and denial of unsecured devices<\/li>\n\n\n\n<li>Compatible with 150 vendors offering flexibility with network device configurations<\/li>\n\n\n\n<li>Industry-leading NGFW for physical, virtual, and cloud systems<\/li>\n\n\n\n<li>Access to threat intelligence and research from FortiGuard Labs<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.JFrog_.jpeg\" alt=\"JFrog logo\" class=\"wp-image-20061\" width=\"157\" height=\"154\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.JFrog_.jpeg 925w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.JFrog_-300x293.jpeg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.JFrog_-768x749.jpeg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.JFrog_-150x146.jpeg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.JFrog_-696x679.jpeg 696w\" sizes=\"(max-width: 157px) 100vw, 157px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"jfrog\"><strong>JFrog<\/strong><\/h3>\n\n\n\n<p>When it comes to end-to-end DevOps solutions, JFrog has been a notable vendor for almost a decade. With the acquisitions of Vdoo and Upswift over the summer, the Israeli-American software lifecycle company can continuously update and secure IoT devices as a budding <a href=\"https:\/\/www.esecurityplanet.com\/applications\/devsecops\/\">DevSecOps<\/a> solution. JFrog offers visibility across application and service lifecycles and can inform and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\">automate security<\/a> strategies addressing edge traffic and machines.<\/p>\n\n\n\n<p>The JFrog Platform relies on a universal binary repository that records all dependencies, builds artifacts, and releases management details. This basis provides high availability and seamless multi-site replication for managing increasingly complex software deployments. For security and compliance, JFrog offers software composition analysis (SCA) for analyzing <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">third-party<\/a> and open source software, capable of scanning all major package types alongside a full REST API for seamless integration into existing infrastructure.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>JFrog Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Support for on-premises, cloud, multi-cloud, or hybrid deployments<\/li>\n\n\n\n<li>Configure artifact metadata and search by name, archive, checksum, or properties<\/li>\n\n\n\n<li>Index and scan package types like Go, Docker, Python, npm, Nuget, and Maven<\/li>\n\n\n\n<li>Vulnerability intelligence to alert and inform remediation of bugs<\/li>\n\n\n\n<li>24\/7 support from the JFrog Research &amp; Development team<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/products\/application-security-vendors\/\">Top Application Security Vendors<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.Overwatch.jpeg\" alt=\"Overwatch logo\" class=\"wp-image-20060\" width=\"130\" height=\"130\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Overwatch.jpeg 400w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Overwatch-300x300.jpeg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.Overwatch-150x150.jpeg 150w\" sizes=\"(max-width: 130px) 100vw, 130px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"overwatch\"><strong>Overwatch<\/strong><\/h3>\n\n\n\n<p>To guard an increasing number of IoT devices against brute force attacks, server <a href=\"https:\/\/www.esecurityplanet.com\/applications\/owasp-list-gets-a-new-top-vulnerability\/\">application vulnerabilities<\/a>, and escalated access, Overwatch specializes in IoT security through its ThreatWatch solution. Hailing from Little Switzerland (North Carolina), the vendor launched in 2015 to address the era of SD-WANs and edge connectivity. Threatwatch offers organizations security management analytics for network devices, threat monitoring, and resolution capabilities, as well as a visual map of all active connections.<\/p>\n\n\n\n<p>For devices, the Overwatch agent is an edge-deployed security monitoring solution communicating with the Threatwatch platform to provide administrators with real-time traffic analysis. Administrators have visibility into active connections and can take remediation actions like rebooting or device locking when appropriate.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Overwatch Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Easy-to-use web interface for central management of agents and devices<\/li>\n\n\n\n<li>Lightweight, discreet agent resilient enough to block exploits<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-control-api-security-risks\/\">API<\/a> for communicating real-time threat assessment and mitigation to device agents<\/li>\n\n\n\n<li>Administrative access to analytics, data storage, and assessments<\/li>\n\n\n\n<li>Configure security policies for IoT devices and clusters with specific criteria<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.PAN_-1024x257.png\" alt=\"Palo Alto Networks logo\" class=\"wp-image-20059\" width=\"284\" height=\"71\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PAN_-1024x257.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PAN_-300x75.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PAN_-768x193.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PAN_-150x38.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PAN_-696x175.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PAN_-1068x268.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PAN_.png 1200w\" sizes=\"(max-width: 284px) 100vw, 284px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"pan\"><strong>Palo Alto Networks<\/strong><\/h3>\n\n\n\n<p>Palo Alto Networks is one of the most innovative global cybersecurity vendors, and its IoT strategy is no different. A part of Palo Alto&#8217;s Network Security vertical, the vendor approaches edge management with the IoT Security Lifecycle. All organizations must understand, assess, and mitigate IoT risks, detect known threats, and respond to anomalies. PAN&#8217;s IoT security framework includes EDR, ZTNA, vulnerability management, asset management, and NAC to provide end-to-end visibility.<\/p>\n\n\n\n<p>With the vendor&#8217;s built-in playbooks, administrators can instantly resolve IoT security risks like resource-intensive API-led integrations and manual processes for ticket creation. In a single platform, it&#8217;s challenging to compete with the monitoring, prevention, and response capabilities PAN provides.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Palo Alto Networks IoT Security Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pre-built integrations for existing IT systems like NAC, SIEM, and ITSM<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/ai-cybersecurity\/\">Machine learning<\/a> and telemetry to inform risk assessment and remediation<\/li>\n\n\n\n<li>Lightweight cloud-delivered security service for easy deployment<\/li>\n\n\n\n<li>NAC or NGFW implementation for building a zero trust infrastructure<\/li>\n\n\n\n<li>Enhanced investigation and threat response for IT, IoT, OT, and Bluetooth devices<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.PTC_-1024x401.png\" alt=\"PTC Software logo\" class=\"wp-image-20058\" width=\"248\" height=\"97\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PTC_-1024x401.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PTC_-300x118.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PTC_-768x301.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PTC_-150x59.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PTC_-696x273.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PTC_-1068x418.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.PTC_.png 1200w\" sizes=\"(max-width: 248px) 100vw, 248px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"ptc\"><strong>PTC<\/strong><\/h3>\n\n\n\n<p>PTC is a longtime provider of computer-aided design (CAD) and product lifecycle management (PLM) software, and almost four decades after its launch, the vendor continues to serve industrial needs with the latest tech like augmented reality (AR) and IIoT solutions. PTC offers the ThingWorx Industrial IoT Solutions Platform as a bundle of tools or standalone solutions for IoT security.<\/p>\n\n\n\n<p>Through Kepware and the ThingWorx Kepware Server, organizations can securely connect to OT systems, equipment, and plants typically siloed in niche protocols. Administrators can configure firewall policies by assigning access and permissions based on user roles. PTC&#8217;s solutions provide the necessary visibility and flexibility to deploy and manage hybrid, cloud, and on-premises systems.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>PTC ThingWorx Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Remote asset monitoring, alerts, and analysis of trends in traffic and systems<\/li>\n\n\n\n<li>Pre-built apps and developer tools for deploying IoT applications<\/li>\n\n\n\n<li>Performance monitoring and management provides real-time analysis<\/li>\n\n\n\n<li>Machine-to-machine (M2M) linking, logic, and communication functionality<\/li>\n\n\n\n<li>Mitigate inefficiencies or risks posed by legacy industrial systems&nbsp;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/ESP.Trustwave.png\" alt=\"Trustwave logo\" class=\"wp-image-20057\" width=\"380\" height=\"168\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Tustwave\"><strong>Trustwave<\/strong><\/h3>\n\n\n\n<p>Chicago-based Trustwave is a leading <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\">managed security service provider<\/a> (MSSP) with billions of security events logged every day. Twenty years in, the cybersecurity vendor has a global presence and the expertise to <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-mdr-solutions\/\">manage detection and response<\/a>, security systems, <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/gdpr-solutions\/\">compliance<\/a>, applications, and databases.<\/p>\n\n\n\n<p>Trustwave offers IoT security for implementers and manufacturers with the software and applications needed to monitor devices and the embedded components to extend protection to hardware. For implementer services, the vendor offers managed IoT monitoring and managed security testing for validating embedded systems. Product developers and manufacturers can conduct IoT product testing, including incident response.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Trustwave Features<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\">Penetration testing<\/a> for investigating vulnerabilities of apps, servers, IoT, and cloud<\/li>\n\n\n\n<li>Scan and track all IP-enabled devices for adequate access control<\/li>\n\n\n\n<li>Personalized approach for managing organizations IoT systems and associated data<\/li>\n\n\n\n<li>Operational resilience with managed and automated compliance functionality&nbsp;<\/li>\n\n\n\n<li>Access to vulnerability, threat, and exploit experts with Trustwave SpiderLabs<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what\"><strong>What Are IoT Security Solutions?<\/strong><\/h2>\n\n\n\n<p>IoT security solutions are the software and embedded tools used to monitor edge devices, proactively detect threats, and facilitate remediation. As such, current IoT security solutions are a mix of standalone and bundle plans that include existing tools like EDR, encryption, IAM, EMM, and more to protect connected devices and networks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What Are IoT Devices?<\/strong><\/h3>\n\n\n\n<p>IoT is the broad label given to all devices capable of communicating with each other, often at short range with unique identities and few components outside its operational intent, including security features. Because of this, several organizations are building security into a new generation of IoT devices (embedded security) while other vendors offer agent-based software to monitor and protect IoT devices.<\/p>\n\n\n\n<p>Examples of IoT devices include most consumer smart systems, autonomous machinery and vehicles, office appliances, and a multitude of healthcare devices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"considerations\"><strong>Considerations for Choosing an IoT Security Solution<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How does the solution isolate IoT devices and access from critical segments?<\/li>\n\n\n\n<li>What protocols and tools are available for secure transactions? (TLS, encryption, Auth0)<\/li>\n\n\n\n<li>Are there embedded or built-in IoT security requirements to address exposure?<\/li>\n\n\n\n<li>What policy controls can administrators configure for unmanaged devices or users?<\/li>\n\n\n\n<li>Does the solution issue and manage secure credentials like PKI and code signatures?<\/li>\n\n\n\n<li>Can solution operators identify, categorize, and provision new devices?<\/li>\n\n\n\n<li>How does the solution establish trust between devices? (e.g., key injection or HSMs)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"features\"><strong>IoT Security Solution Features<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Network <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">scanning<\/a>, device identification, and discovery of active connections<\/li>\n\n\n\n<li>Identify users, data, devices, locations, and more to identify and assess risk categories<\/li>\n\n\n\n<li>Threat intelligence informs the status of malware and available <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patches<\/a><\/li>\n\n\n\n<li>Security gateways to isolate network segments between ports, servers, and IoT devices<\/li>\n\n\n\n<li>Baseline responses to anomalous behavior for individuals or clusters of devices<\/li>\n\n\n\n<li>Define and enforce policies across device and access types for hybrid infrastructures<\/li>\n\n\n\n<li>Automated onboarding, configuration, and threat response policies for new IoT devices<\/li>\n\n\n\n<li>Certificate issuance and management for granting secure credentials and access<\/li>\n<\/ul>\n\n\n\n<p>Because securing IoT devices is a budding cybersecurity segment, the above list is not all-encompassing, and several vendors present unique approaches to addressing IoT security challenges.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"risks\"><strong>IoT Device Risks and Vulnerabilities<\/strong><\/h2>\n\n\n\n<p>Once isolated from other devices and an organization&#8217;s larger IT environment, IoT devices like sensors, doorbells, and printers are now at risk of compromise. With proper segmentation, organizations can avoid access to an IoT device turning into something more, but that won&#8217;t stop threat actors from using the device and others like it in a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/cloudflare-mirai-botnet-ddos-attack\/\">botnet<\/a> attack.<\/p>\n\n\n\n<p>Other identified risks associated with IoT device management include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Insufficient security or data protection capabilities for devices<\/li>\n\n\n\n<li>Inability to add additional security software<\/li>\n\n\n\n<li>Insecure interfaces easily accessible to a persistent threat<\/li>\n\n\n\n<li>Poor <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password<\/a> protection with default credentials staying put<\/li>\n\n\n\n<li>Unreliable patch or update mechanism&nbsp;<\/li>\n\n\n\n<li>Nonexistent or lacking inventory of IoT devices or monitoring IoT traffic<\/li>\n\n\n\n<li>A gap in IoT security management skills for edge systems<\/li>\n\n\n\n<li>Disparate management of IoT and OT systems creating data silos<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>IoT Security: Not Going Away<\/strong><\/h2>\n\n\n\n<p>The proliferation of IoT devices means securing the next generation of IT environments will require IoT-specific security strategies and solutions. Organizations actively deploying IoT devices should be prudent about the <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/iot-device-risk-to-enterprises\/\">security risks of insecure edge devices<\/a> and proceed with caution.<\/p>\n\n\n\n<p>Organizations need to visualize IoT assets under management, profile their risk, apply adequate protections, and monitor IoT traffic for unknown threats. Like so much else in cybersecurity, visibility informs action and strategy \u2013 making the upfront work of selecting an IoT security solution or assembly a strategy that much more valuable in avoiding unnecessary risk.<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">The S in the IoT stands for Security.<\/p>&mdash; Oleg \u0160elajev ???? (@shelajev) <a href=\"https:\/\/twitter.com\/shelajev\/status\/796685986365325312?ref_src=twsrc%5Etfw\">November 10, 2016<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n<div id=\"ta-campaign-widget-66d6c8140cf8b-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6c8140cf8b\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6c8140cf8b\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6c8140cf8b\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6c8140cf8b\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6c8140cf8b\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6c8140cf8b\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>IoT security is where endpoint detection and response (EDR) and enterprise mobility management (EMM) meet the challenges of a rapidly expanding edge computing infrastructure. As the enterprise attack surface grows, IoT is yet another attack vector organizations aren\u2019t fully prepared to defend. Internet of Things (IoT) devices are the smart consumer and business systems powering [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":20055,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[18,17],"tags":[28055,772,9651,562,563,6567],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[31768,138,378,31779,67,140,277,295,283,284,286,142,143,375],"class_list":["post-20054","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile","category-products","tag-edr","tag-emm","tag-faq","tag-internet-of-things","tag-iot","tag-iot-security","b2b_audience-evaluation-and-selection","b2b_product-cloud-based-iot-platform","b2b_product-data-center","b2b_product-endpoint-security","b2b_product-iot-security","b2b_product-it","b2b_product-mobile","b2b_product-mobile-asset-management","b2b_product-mobile-device-management","b2b_product-mobile-devices","b2b_product-mobile-management","b2b_product-mobile-security","b2b_product-pcs-and-peripherals","b2b_product-security","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top IoT Security Solutions | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"This is a buyer&#039;s guide of the top IoT security solutions. Browse our list of the best software and compare features.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top IoT Security Solutions | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"This is a buyer&#039;s guide of the top IoT security solutions. Browse our list of the best software and compare features.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-20T05:13:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-20T19:48:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"Top IoT Security Solutions\",\"datePublished\":\"2021-11-20T05:13:02+00:00\",\"dateModified\":\"2023-01-20T19:48:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\"},\"wordCount\":2853,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg\",\"keywords\":[\"EDR\",\"EMM\",\"FAQ\",\"internet of things\",\"IoT\",\"IoT security\"],\"articleSection\":[\"Mobile\",\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\",\"name\":\"Top IoT Security Solutions | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg\",\"datePublished\":\"2021-11-20T05:13:02+00:00\",\"dateModified\":\"2023-01-20T19:48:03+00:00\",\"description\":\"This is a buyer's guide of the top IoT security solutions. Browse our list of the best software and compare features.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"A picture showing four red straight, laser-like lines representing the sensors that make up OT and IoT devices. This article is about the top IoT security solutions which.look the next generation of smart devices and systems powering consumer and organization locations.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top IoT Security Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top IoT Security Solutions | eSecurity Planet","description":"This is a buyer's guide of the top IoT security solutions. Browse our list of the best software and compare features.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Top IoT Security Solutions | eSecurity Planet","og_description":"This is a buyer's guide of the top IoT security solutions. Browse our list of the best software and compare features.","og_url":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/","og_site_name":"eSecurity Planet","article_published_time":"2021-11-20T05:13:02+00:00","article_modified_time":"2023-01-20T19:48:03+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"Top IoT Security Solutions","datePublished":"2021-11-20T05:13:02+00:00","dateModified":"2023-01-20T19:48:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/"},"wordCount":2853,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg","keywords":["EDR","EMM","FAQ","internet of things","IoT","IoT security"],"articleSection":["Mobile","Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/","url":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/","name":"Top IoT Security Solutions | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg","datePublished":"2021-11-20T05:13:02+00:00","dateModified":"2023-01-20T19:48:03+00:00","description":"This is a buyer's guide of the top IoT security solutions. Browse our list of the best software and compare features.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/ESP.TopIoTSecuritySolutions-scaled.jpg","width":2560,"height":1707,"caption":"A picture showing four red straight, laser-like lines representing the sensors that make up OT and IoT devices. This article is about the top IoT security solutions which.look the next generation of smart devices and systems powering consumer and organization locations."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Top IoT Security Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20054"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20054"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20054\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20055"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20054"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20054"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20054"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}