White Paper

Zero Trust and IoT – How to mitigate IoT security risk

White Paper Overview

IoT adoption in the home and workplace doesn’t show any sign of slowing down. Analyst firm IDC predicts that there will be 200 billion connected devices by 2020 and if standards stay the same that could mean billions of security vulnerabilities. The Marai virus demonstrated how IoT devices with default settings are vulnerable to infection and its effectiveness when used in DDOS attacks. There are more malicious variants underway that target ARC processors embedded into a broad array of Linux-based devices.

A recent survey of IT professionals found that less than half of their organizations incorporated security policies that covered IoT devices, and only a third could say it covered home networks used to access corporate systems. Knowing what devices are on your network and implementing comprehensive network access control systems are critical to staying on top of security vulnerabilities.

To help mitigate these risks, this 10-point list provides some simple yet effective steps for device discovery, management, and access control that organizations should adopt across every network that either currently has, or potentially could have, IoT devices on it.

About Pulse Secure

Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services that improve visibility, protection and productivity for our customers. Our suites uniquely integrate cloud, mobile, application and network access to enable hybrid IT in a Zero Trust world. Over 20,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.