IoT Security uses machine learning to discover the applications
that IoT devices on your network use.
Knowing which applications your network-connected
IoT devices use and how many devices use them can prove useful,
especially when defending against a potential threat. For example,
if you know a widely used application was recently compromised,
you can check which devices use it and respond in proportion to
how critical the application is. If it’s non-essential for business,
you can create policy recommendations for firewalls to block that
application. If it is essential and there is a new version, you
can assign operations the task to upgrade all devices that use it.
And if it is essential and there isn’t a new version yet, segment
all devices that use it and restrict access to them only to people
and resources that are necessary for them to function. Having visibility
into the applications on your network allows you to take swift action
to safeguard your assets when danger threatens.
IoT Security displays all the applications that have been spotted
in use on the Applications page.
The Applications page shows the total number of unique applications
detected for devices matching the site, device-type, and time-range
filters set at the top of the page. Although IoT Security displays
devices and networks as soon as it discovers and identifies them,
it collects data about detected applications over the course of
a day and then compiles a list. It then displays that list on the
Applications page until it compiles the next daily list of applications
detected on the network. When you start using IoT Security, you
might notice that it begins showing data on the Devices and Networks
page before showing anything on the Applications page. This can
happen because IoT Security hasn't generated a list of applications
yet. After it does, it will continue doing that every day thereafter.
If you set the time-range filter for
, the Applications
page shows numbers for the time range you set. However, because
IoT Security organizes the applications it detects into daily lists,
the time-range filter for
same set of unique applications as
which is the smallest list of applications you can see. In addition,
IoT Security doesn’t maintain application details for more than
a month. Therefore, the time-range filter for
the same set of unique applications as
which is the largest list of applications you can see.
Click a number in the Number of Devices column to open the Devices
page with a filter applied to show only devices that use the corresponding
application. Hovering your cursor over the blue text of an entry
in the Profiles column displays a list of all profiles that use