: IoT Security: Device Visibility and Automatic Policy Rule Recommendations
Focus
Focus

IoT Security: Device Visibility and Automatic Policy Rule Recommendations

Table of Contents

IoT Security: Device Visibility and Automatic Policy Rule Recommendations

Use IoT Security features from within the Strata Cloud Manager web interface for IoT device visibility and the automatic generation of policy rule recommendations.
Strata Cloud Manager
integrates with IoT Security to provide visibility into the devices on your network and automated policy rule recommendations for policy enforcement on next-generation firewalls and
Prisma Access
. By having
IoT Security
functionality in
Strata Cloud Manager
, IoT device visibility and policy rule recommendations become available in the same platform you're using to manage firewalls and interact with other network security products.
When your firewalls or
Prisma Access
is subscribed to
IoT Security
, you can use the following IoT Security features from the
Strata Cloud Manager
web interface:
  • IoT Security Dashboard
    : In
    Strata Cloud Manager
    , there is an IoT Security dashboard with information about the devices on the network, their device profiles and operating systems, and how they are distributed by device type across subnets. For advanced
    IoT Security
    products (Enterprise
    IoT Security
    Plus, Industrial
    IoT Security
    , or Medical
    IoT Security
    ), the IoT Security dashboard additionally displays the total number of active alerts to date and vulnerabilities to date.
  • Assets Inventory
    : See a dynamically maintained inventory of the devices on your network with numerous attributes for each one such as its IP and MAC addresses; profile, vendor, model, and OS; and (for advanced
    IoT Security
    products) its device-level risk score.
  • Security Policy Rule Recommendations
    :
    IoT Security
    provides
    Strata Cloud Manager
    with automatically generated Security policy rule recommendations organized by device profile. There is one recommendation per application per profile. Choose a profile, select the rule recommendations you want to use, and then the next-generation firewalls or
    Prisma Access
    sites where you want to enforce them.

Recommended For You