IoT Security
IoT Security Release Information
Table of Contents
Expand All
|
Collapse All
IoT Security Docs
-
-
- Firewall Deployment Options for IoT Security
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
-
IoT Security Release Information
Learn about how IoT Security release work, and about the latest features, fixes, and
research added.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
As a cloud-delivered security solution, IoT Security releases features on an
on-going basis. See the monthly release notes for a summary of what features and
enhancements IoT Security introduced each month, as well as the known and
addressed issues.
In addition to new features, IoT Security adds detections for new vulnerabilities
every month. The release notes include a summary of how many new vulnerabilities
IoT Security added detection for each month, as well as how many of those have a
critical CVSS score. To see the full list of CVEs each month, check the Announcements
in the IoT Security portal.
IoT Security uses a dictionary file to identify device attributes as accurately
as possible. The IoT Security team updates the dictionary file continuously
to track new profiles, vendors, models, and operating systems. See the monthly release
notes for a summary of the dictionary file updates.