Webroot launches toolkit to secure IoT devices and networks

Yet another way of protecting your Internet of Things (IoT) devices is here. Webroot, a company that was into providing intelligent cybersecurity for endpoints and collective threat intelligence, today announced the release of the Webroot IoT Security Toolkit.

The toolkit, it said, enabled IoT and Industrial Internet of Things (IIoT) solution designers and system integrators to integrate Cloud-based, real time threat intelligence services and intelligent cybersecurity device agents to protect the next generation of critical systems against modern malware, zero-day exploits and other external threats and internal vulnerabilities.

There’s little doubt left that as organisations move toward the IoT,  the nature and severity of attacks were increasing. The Webroot IoT Security Toolkit claimed to provide continuously updated threat intelligence that leveraged “industry-leading” Webroot BrightCloud Threat Intelligence.

The Platform actively scanned the entire Internet multiple times a day to detect and classify all types of Online threats, claimed Webroot in a written statement. The IoT toolkit was available to device manufacturers, systems integrators and Webroot technology partners who strove to offer operational safety and security to their customers. Additionally, any class of next-generation device, gateway, server, or network element could be monitored and protected.

The Webroot IoT Security Toolkit included:

Device Agents: High performance, low system impact, small device footprint software agents detected new and altered files or anomalous conditions. Agents collected data about files and other system level anomalous events and communicated the same to the Webroot BrightCloud Threat Intelligence Platform.
Threat Intelligence Services: Webroot BrightCloud Threat Intelligence Services could be integrated into the IoT gateways and platforms to block malicious inbound attacks and prevent data exfiltration.
Secure Web Gateway: This Cloud-based service inspected and filtered all incoming and outgoing traffic between devices and their control system over the Internet, intercepting malware before it reached the network or endpoint devices.

Image Credit: Webroot

 

Leave a Reply

Click here to opt out of Google Analytics