{"id":67085,"date":"2023-05-15T14:18:18","date_gmt":"2023-05-15T06:18:18","guid":{"rendered":"https:\/\/version-2.com\/?p=67085"},"modified":"2023-05-15T14:20:02","modified_gmt":"2023-05-15T06:20:02","slug":"iot-device-monitoring-safeguarding-your-connected-world","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/05\/iot-device-monitoring-safeguarding-your-connected-world\/","title":{"rendered":"IoT Device Monitoring: Safeguarding Your Connected World"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"67085\" class=\"elementor elementor-67085\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/05\/IoT-Device-Monitoring.png\" width=\"800\" height=\"500\" \/>\n\n<div class=\"fl-module fl-module-fl-post-content fl-node-60afe48bd6f5c\" data-node=\"60afe48bd6f5c\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<p>From smart homes to industrial automation, IoT devices have become ubiquitous in our daily lives. However, as the number of devices increases, so do the security risks. Hackers are constantly finding new ways to exploit vulnerabilities and gain access to sensitive information. This is where IoT device monitoring comes in \u2013 a crucial tool for businesses to keep their networks secure and their data safe.<\/p>\n<p>With this in mind, let\u2019s explore why IoT device monitoring is essential and how it can help organizations mitigate the risks associated with IoT devices.<\/p>\n<h3>What is IoT Device Monitoring?<\/h3>\n<p>IoT device monitoring involves tracking and analyzing the behavior of Internet of Things (IoT) devices and using that data to gain insights into the health, performance, and security of those devices. In short, it helps you provision, monitor, and maintain the growing sprawl of connected devices in your organization, and it\u2019s becoming increasingly vital in today\u2019s ever-connected world.<\/p>\n<p>With the growing complexity of IoT ecosystems, it\u2019s crucial to maintain robust control over the devices in your network and how they\u2019re being used. When you have many connected devices, it\u2019s easy for something to go wrong. Whether it\u2019s a malfunctioning sensor, a compromised device, or a network outage, any disruption can have severe impacts on your business.<\/p>\n<p>IoT device monitoring typically involves a range of activities, including:<\/p>\n<ol>\n<li><strong>Real-time data collection:<\/strong> IoT device monitoring systems collect data from devices in real time, often using sensors or other types of monitoring tools.<\/li>\n<li><strong>Performance analysis: <\/strong>Data collected from IoT devices can be analyzed to understand how well devices are performing, including factors such as response time, uptime, and energy consumption.<\/li>\n<li><strong>Predictive maintenance: <\/strong>By monitoring IoT devices, it\u2019s possible to identify potential problems before they occur, enabling organizations to take preventive measures and minimize downtime.<\/li>\n<li><strong>Security monitoring:<\/strong> IoT device monitoring can also help detect and prevent security breaches, such as unauthorized access to IoT devices or data theft.<\/li>\n<\/ol>\n<h3>What is IoT Device Management?<\/h3>\n<p>There are <strong>over 15 billion<\/strong> <a href=\"https:\/\/explodingtopics.com\/blog\/number-of-iot-devices\" target=\"_blank\" rel=\"noopener\">connected IoT devices<\/a> worldwide, and the number of active IoT devices is expected to <strong>double<\/strong> by 2030. With this surge in IoT devices, organizations are under increasing pressure to manage and maintain these devices or risk broken connected systems or cyberattacks. This is where IoT device management comes in. It comprises both the technologies and processes you need to govern your IT landscape.<\/p>\n<p>Here are some of the critical components of IoT device management:<\/p>\n<ul>\n<li><strong>Device onboarding:<\/strong> IoT devices require onboarding to the network, involving steps like credential checks and assigning device identity.<\/li>\n<li><strong>Device configuration:<\/strong> Each device needs to be configured according to business needs, such as grouping devices based on the area of operation.<\/li>\n<li><strong>Operational diagnostics:<\/strong> Diagnostics offer valuable insights, but most devices lack the resources to analyze them, requiring centralized management.<\/li>\n<li><strong>Device security:<\/strong> IoT device management applies necessary security protocols, bringing all endpoints under organizational oversight.<\/li>\n<li><strong>Device maintenance: <\/strong>Maintenance includes updating firmware and watching for security vulnerabilities, performed in bulk via over-the-air (OTA) updates.<\/li>\n<li><strong>End-of-life:<\/strong> End-of-life policies specify how to retire devices, decommissioning steps, and recycle materials for a minimal carbon footprint.<\/li>\n<\/ul>\n<p>IoT device monitoring and IoT device management are closely related, but not interchangeable. IoT device monitoring falls under IoT device management, which is a more comprehensive approach to all things IoT.<\/p>\n<h3>The Shadow IoT Risk<\/h3>\n<p>IoT devices have proven to be incredibly useful, but they do come with unique challenges that network administrators must be wary of. One of the most significant issues is that these devices can seamlessly join any wireless network, allowing them to be installed without prior authorization from IT. This is known as Shadow IoT, a common problem in many organizations.<\/p>\n<p>The trouble with<a href=\"https:\/\/www.portnox.com\/lp\/ty-so-long-shadow-iot\/\" target=\"_blank\" rel=\"noopener\"> Shadow IoT<\/a> devices is that they don\u2019t support additional software installs, and they don\u2019t use typical network monitoring methods like SNMP, making them difficult to detect. When these devices go unnoticed, they can increase your attack surface, leaving you vulnerable to attack. Upgrading the device\u2019s OS or firmware can also be a painful task, making it challenging to stay on top of device security.<\/p>\n<p>But the risks of Shadow IoT don\u2019t end there. These unmanaged devices can cause network issues, leading to slow performance or outages. They may also violate compliance regulations, leading to hefty fines and damage to the company\u2019s reputation.<\/p>\n<h3>How To Secure IoT Devices<\/h3>\n<p>Securing IoT devices is no easy feat, but it\u2019s vital in today\u2019s increasingly severe threat landscape. One technique gaining prominence is IoT fingerprinting.<\/p>\n<p>IoT fingerprinting involves identifying and profiling IoT devices on a network by analyzing their unique attributes, such as device type, operating system, firmware version, or even specific vendor characteristics. This allows network administrators can gain valuable insights into their IoT ecosystem and improve their overall security posture. In addition, IoT fingerprinting is particularly useful for detecting Shadow IoT devices that may be lurking on the network and not visible through traditional network monitoring methods.<\/p>\n<p>Beyond IoT fingerprinting, here are some essential techniques to help ensure IoT device security:<\/p>\n<ol>\n<li><strong>Encryption:<\/strong> Always use encryption to secure data transmission and storage on IoT devices.<\/li>\n<li><strong><a href=\"https:\/\/www.portnox.com\/solutions\/network-authentication\/\" target=\"_blank\" rel=\"noopener\">Authentication<\/a>: <\/strong>Use robust authentication protocols to verify device identity, user credentials, and device-to-device communication.<\/li>\n<li><strong>Access control:<\/strong> Implement strict access controls to limit access to IoT devices based on user roles and permissions.<\/li>\n<li><strong>Regular monitoring: <\/strong>Continuously monitor your IoT devices to detect and respond to any security threats or anomalies.<\/li>\n<li><strong>Firmware updates:<\/strong> Keep your IoT devices up-to-date with the latest firmware updates to patch vulnerabilities and address security issues.<\/li>\n<li><strong>Physical security:<\/strong> Physically securing IoT devices can help prevent theft, tampering, or unauthorized access. Consider using locks or security cages for devices in public areas or high-risk environments.<\/li>\n<li><strong>Network segmentation:<\/strong> Segregate your IoT devices from other parts of your network to prevent attackers from moving laterally across your environment in the event of a successful attack.<\/li>\n<li><strong>Behavioral analysis: <\/strong>Analyze the behavior of IoT devices to identify potential anomalies or threats. This can help you detect suspicious activity and take action before any damage occurs.<\/li>\n<li><strong>Vulnerability scanning:<\/strong> Conduct regular vulnerability scans on your IoT devices to identify and remediate potential <a href=\"https:\/\/www.portnox.com\/cybersecurity-101\/wireless-network-security-risks\/\" target=\"_blank\" rel=\"noopener\">security risks<\/a>.<\/li>\n<li><strong>Incident response planning:<\/strong> Have a comprehensive incident response plan for IoT security incidents, including roles and responsibilities, escalation paths, and communication protocols.<\/li>\n<\/ol>\n<h3>Final Thoughts<\/h3>\n<p>IoT devices are here to stay, which means we need to start taking a more dedicated and proactive approach to ensuring IoT security. Without IoT device monitoring and management, organizations leave themselves vulnerable to a wide range of potential threats, including data breaches and system outages. Fortunately, with the right combination of policies, processes, and technology, organizations can effectively secure their IoT devices and minimize risk.<\/p>\n\t<\/div>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>From smart homes to industrial automation, IoT devices  [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1075,61],"tags":[1076,352,423],"class_list":["post-67085","post","type-post","status-publish","format-standard","hentry","category-portnox","category-year2023","category-press-release","tag-1076","tag-network","tag-portnox"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IoT Device Monitoring: Safeguarding Your Connected World - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT Device Monitoring: Safeguarding Your Connected World - Version 2\" \/>\n<meta property=\"og:description\" content=\"From smart homes to industrial automation, IoT devices [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-15T06:18:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-15T06:20:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/05\/IoT-Device-Monitoring.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/05\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"IoT Device Monitoring: Safeguarding Your Connected World\",\"datePublished\":\"2023-05-15T06:18:18+00:00\",\"dateModified\":\"2023-05-15T06:20:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/05\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/\"},\"wordCount\":1122,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/IoT-Device-Monitoring.png\",\"keywords\":[\"2023\",\"Network\",\"Portnox\"],\"articleSection\":[\"Portnox\",\"2023\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/05\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/\",\"name\":\"IoT Device Monitoring: Safeguarding Your Connected World - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/IoT-Device-Monitoring.png\",\"datePublished\":\"2023-05-15T06:18:18+00:00\",\"dateModified\":\"2023-05-15T06:20:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/IoT-Device-Monitoring.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/IoT-Device-Monitoring.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/iot-device-monitoring-safeguarding-your-connected-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT Device Monitoring: Safeguarding Your Connected World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT Device Monitoring: Safeguarding Your Connected World - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/","og_locale":"en_US","og_type":"article","og_title":"IoT Device Monitoring: Safeguarding Your Connected World - Version 2","og_description":"From smart homes to industrial automation, IoT devices [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/","og_site_name":"Version 2","article_published_time":"2023-05-15T06:18:18+00:00","article_modified_time":"2023-05-15T06:20:02+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/05\/IoT-Device-Monitoring.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/05\/iot-device-monitoring-safeguarding-your-connected-world\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"IoT Device Monitoring: Safeguarding Your Connected World","datePublished":"2023-05-15T06:18:18+00:00","dateModified":"2023-05-15T06:20:02+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/05\/iot-device-monitoring-safeguarding-your-connected-world\/"},"wordCount":1122,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/05\/IoT-Device-Monitoring.png","keywords":["2023","Network","Portnox"],"articleSection":["Portnox","2023","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/05\/iot-device-monitoring-safeguarding-your-connected-world\/","url":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/","name":"IoT Device Monitoring: Safeguarding Your Connected World - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/05\/IoT-Device-Monitoring.png","datePublished":"2023-05-15T06:18:18+00:00","dateModified":"2023-05-15T06:20:02+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/05\/IoT-Device-Monitoring.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/05\/IoT-Device-Monitoring.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/iot-device-monitoring-safeguarding-your-connected-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"IoT Device Monitoring: Safeguarding Your Connected World"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hs1","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/67085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=67085"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/67085\/revisions"}],"predecessor-version":[{"id":67089,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/67085\/revisions\/67089"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=67085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=67085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=67085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}