Home Latest News Webroot Launches Industrial IoT Security Kit

Webroot Launches Industrial IoT Security Kit

by CIO AXIS

Internet security firm Webroot has launched a new toolkit aimed at delivering threat intelligence and increased security for connected Internet of Things (IoT) devices.

Built for designers of IoT and Industrial Internet of Things (IIoT) devices, the new Webroot IoT Security Toolkit offers integrated protection against threats such as malware and zero-day exploits, as well as internal vulnerabilities.

The toolkit can leverage existing cloud-based, real-time threat intelligence services to increase the security of IoT devices in various scenarios, Webroot said.

The toolkit includes three components: Device Agents, Threat Intelligence Services, and Secure Web Gateway, each designed to offer defense mechanisms at a different level.

The Device Agents are low impact, small footprint software components that can detect new or altered files and anomalous events at the system level and send the information to Webroot’s BrightCloud Threat Intelligence Cloud Platform, without impacting device performance.

System designers can integrate the BrightCloud Threat Intelligence Services into IoT gateways and platforms to defend against malicious inbound attacks, while the cloud-based Secure Web Gateway service monitors traffic between devices and control systems over the Internet to intercept malware before it reaches the network or endpoints.

“Because the Webroot IoT Security Toolkit leverages real-time threat intelligence to protect deployed systems against cyberattacks, solution designers and integrators can meet the mandatory requirements for security and safety systems by ensuring that critical devices and systems operate as expected,” John Sirianni, VP of IoT Strategic Partnerships at Webroot, said in a statement.

The Webroot IoT Security Toolkit is available to device manufacturers, systems integrators and Webroot technology partners. The solution supports monitoring of any device, gateway, or server, and can be integrated using REST and other API call methods, SDKs, or Embedded C Code.

Recommended for You

Recommended for You

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Close Read More

See Ads