New Features in April 2026
Focus
Focus
Device Security

New Features in April 2026

Table of Contents

New Features in April 2026

Review the new features introduced in Device Security in April 2026.
Where Can I Use This?What Do I Need?
  • Device Security (Managed by Strata Cloud Manager)
  • (Legacy) IoT Security (Standalone portal)
One of the following subscriptions:
  • Device Security subscription for an advanced Device Security product (Enterprise, OT, or Medical)
  • Device Security X subscription
The following new features and enhancements were introduced for Device Security in April 2026.
New Features
Vulnerability signatures
The Device Security Research team added detections for 677 vulnerabilities this month. Of the 677 vulnerabilities, 17 of them had a critical CVSS score. You can see a complete list of the CVEs for which detections have been added at Vulnerability Signatures in 2026.
Dictionary file update
There were five device dictionary file updates in April 2026. The following summarizes what was added in each update:
  • April 01 update – 10 new profiles, 16 new vendors, 47 new OSes, and 73 new models
  • April 09 update – 22 new profiles, 6 new vendors, and 68 new models
  • April 16 update – 21 new profiles, 11 new vendors, 78 new OSes, 1 new OS family, and 1140 new models
  • April 23 update – 26 new profiles, 19 new vendors, 1 new category, 17 new OSes, and 73 new models
  • April 30 update – 12 new profiles, 10 new vendors, 2 new OSes, and 10 new models

Threat Intelligence for Vulnerabilities in Device Security

When your vulnerability inventory spans hundreds of high-severity CVEs, severity scores alone don't tell you which ones threat actors are actively exploiting in your industry or region. Device Security now provides enhanced threat intelligence data associated with vulnerabilities, including known threat actor campaigns, detailed threat actor profiles, and signs or indicators of compromised systems. You can find, prioritize, and mitigate vulnerabilities based on this additional information about the threat landscape.
On the Vulnerability Inventory page, you can query vulnerabilities associated with active or inactive campaigns, or by the industries and regions target by known actors. From the Vulnerability Details page, you can dive deeper into the background and context for these attributes.
From the Vulnerability Details page, you can follow indicators of compromise directly to the threat search in Strata Cloud Manager to check whether any of those indicators have appeared in your network. This gives your security team a path from vulnerability discovery to active threat hunting without switching tools or manually correlating data across systems.

Alert Mapping to MITRE ATT&CK and IEC 62443 in Device Security

When you investigate a security alert in Device Security, you can see which MITRE ATT&CK tactics and techniques from ICS and Enterprise frameworks, and which IEC 62443 security requirements, apply to that alert. Use this context to help assess severity, prioritize remediation, and evaluate your compliance posture without manually cross-referencing external frameworks.
On the Alert Details page, a new Compliance and Security Frameworks section lists the IEC 62443 requirements associated with the alert, and a MITRE ATT&CK section that displays the framework, tactic name, technique name, and technique ID for each mapped entry. On the Alert Inventory page, new attributes let you filter and search by MITRE ATT&CK framework, tactic, technique name, and technique ID, as well as by IEC 62443 reference, so you can surface all alerts associated with a given attack technique or compliance requirement.
Correlating alerts with recognized threat frameworks helps you prioritize which incidents represent the most critical attack paths for your assets and demonstrates to auditors that your security posture aligns with compliance requirements. Device Security maps these frameworks automatically to each alert so your security team spends less time cross-referencing documentation and more time responding to threats.

Custom Reports for Device Security

With Custom Reports, you can build report templates for assets, alerts, and vulnerabilities and generate them on demand or on a schedule — without relying on manual data exports or external tools. Security administrators responsible for continuous auditing often have to export data from Device Security and manipulate it elsewhere to produce reports that match their organization's priorities, scoping requirements, or compliance frameworks.
Custom Reports supports flexible scoping through the Query Builder, so you can tailor each template to the sites, device types, and attributes your team cares about. Reports are produced in PDF and CSV formats, retained in the Report History, and can be delivered automatically by email to internal and external stakeholders on a schedule you set.
With custom report templates, you can reuse them for different reporting scenarios, such as for executive security summaries or for compliance audits, so your team spends less time rebuilding reports from scratch. Scheduling reports within Device Security replaces infrequent manual reporting with a cadence that keeps your security posture continuously visible. You can also clone system-provided templates or convert custom dashboards into report templates.

Inventory Gap Report for Device Security

The inventory gap report requires integrating Device Security with AIMS3.
When you integrate Device Security with an external asset management system, keeping both inventories in sync is difficult — manual data entry creates errors, and devices can go unaccounted for in either direction. If you have an AIMS3 integration enabled, you can now generate an Inventory Gap Report to compare your Device Security asset inventory against your AIMS3 data and identify discrepancies without reconciling large datasets by hand.
The report identifies devices that Device Security discovered but that are absent from your external source, and devices that your external source records but that Device Security is not monitoring. It also flags assets that appear in both systems but differ on classification, and near-matches where a data entry error may have created a duplicate or orphaned record. You can run a Gap Report on demand or on a recurring schedule.
Keeping asset inventories in sync across systems is difficult when one relies on manual data entry. A single discrepancy can leave a device unmonitored or cause your records to diverge from what Device Security sees on the network. The Inventory Gap Report gives your team an automated way to catch and correct these discrepancies before they become coverage gaps.

Device Security Integration with Octoplant Octovision

Integrating Device Security with Octoplant Octovision lets you view and apply OT-specific ontext directly to your device profiles in Device Security. Octoplant Octovision contains information for OT devices, such as PLCs, HMIs, and robot controllers, which Device Security may not be able to learn from network traffic. This gap causes incomplete device profiles and requires more manual correlation of threats and vulnerabiltiies to OT devices.
Through the Octoplant Octovision integration, Device Security pulls asset and server data from Octovision and correlates it with devices already in your inventory. Device records in Device Security are enriched with Octoplant-sourced attributes, such as which Octoplant server manages a given asset, the device's hardware module and order number, and its identifiers, giving you a more complete picture of the OT devices in your environment without requiring manual data entry.
Bringing Octoplant asset data into Device Security reduces the manual effort of reconciling your OT asset management and security inventories. With Octoplant-sourced context available alongside Device Security network monitoring data, your team can assess OT device risk and coverage from a single, consolidated view rather than cross-referencing separate systems.