Detect & protect IoT

Many companies are adopting new, networked systems like buildings management systems, card access control systems, and industrial control monitoring sensors to improve efficiency and cut costs. Though useful, these Internet of Things (IoT) systems often uses very lightweight software that often can’t accommodate traditional security controls designed to deter malware and intrusions.

“IoT usage is rapidly growing year-on-year, with 75.44 billion installed IoT devices predicted worldwide by 2025 (Source: Statista). “

What the Security standards say

Detecting IoT is an important aspect of asset management, which is part of pretty much every cyber security standard. There are many security standards; the table below shows some of the standards and the relevant sections stating the need for an effective, real-time asset management process to provide the foundation for Cyber security processes:

Subcategory Framework reference
ID.AM-1: Physical devices and systems within the organization are inventoried CIS CSC 1
COBIT 5 BAI09.01, BAI09.02
ISA 62443-2-1:2009
ISA 62443-3-3:2013 SR 7.8
ISO/IEC 27001:2013 A.8.1.1, A.8.1.2
NIST SP 800-53 Rev. 4 CM-8, PM-5

IoT Autodiscovery

Rebasoft provides a 360-degree, real-time, bird’s-eye view of all devices and traffic on your network, making light work of monitoring IoT devices and any suspicious traffic that may flow through them.

As soon as Rebasoft is deployed on a network, it identifies and catalogs all connected devices. Put simply, if something connects to your network, Rebasoft can provide surprisingly detailed insight into what it is and what it’s doing – whether it’s a PC, a server, a switch, or an IoT system.

Rebasoft eliminates the need for manual asset recording by providing an accurate, real-time picture of all devices connected to your network. Rebasoft even discovers potentially vulnerable devices connected to your network but may have been long forgotten.

Protecting IOT devices

IO systems on your network (and other devices where anti-malware controls can’t be applied) can quickly be flagged, profiled, and monitored using Rebasoft’s comprehensive malware and hack detection features. Our solution operates in real-time and at network level, so it doesn’t rely on individual software agents or periodic scans that may cause areas of the network to be overlooked.

But looking at a network’s hardware will only ever provide part of the story. Rebasoft’s robust behaviour monitoring functionality establishes an ongoing picture of what normal network activity looks like so it can raise an alert when something suspicious may be happening.

Hacking attempts and malware propagation commonly cause spikes in uncommon types of network traffic. Thankfully, these behaviour patterns are easily detected by Rebasoft’s real-time behaviour monitoring capabilities. If any suspicious activity is detected around any given endpoint (not just an IoT system), Rebasoft can use automated port blocking to effectively quarantine the device from the network and alert an engineer to investigate further.

So even though IoT devices typically can’t be protected by anti-malware controls, Rebasoft provides a way of holistically securing your whole network with robust asset, perimeter, and behaviour monitoring functions.

Share This Story, Choose Your Platform!