• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech
Hackers Cryptojack Microsoft Azure ML Clusters

Compare the top cloud-based IoT security platforms to protect devices

December 11, 2020
How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft Cloud Announces Three New Vertical Cloud Solutions

February 26, 2021
Innovative solutions for IT workers at home

Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

February 26, 2021
Innovative solutions for IT workers at home

What is database encryption?

February 26, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Releases Azure Firewall Premium in Public Preview

February 26, 2021
Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

February 25, 2021
8×8 makes raft of updates to platform

Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

February 25, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

February 25, 2021
Innovative solutions for IT workers at home

ZEDEDA Announces Integration with Microsoft Azure IoT to Seamlessly and Securely Orchestrate Distributed Edge Computing Workloads at Scale

February 24, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

ZEDEDA integrates with Microsoft Azure IoT to provide full lifecycle management capabilities

February 24, 2021
Innovative solutions for IT workers at home

SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

February 23, 2021
A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Affirms Solorigate Attackers Saw Azure, Intune and Exchange Source Code

February 23, 2021
How to use Microsoft Sysmon, Azure Sentinel to log security events

OPS101 – Securing your Hybrid environment – Part 1 – Azure Security Center

February 22, 2021
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Friday, February 26, 2021
  • Login
Azure Security News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • News
    • All
    • Business
    • Politics
    • Science
    • World
    How to use Microsoft Sysmon, Azure Sentinel to log security events

    Microsoft Cloud Announces Three New Vertical Cloud Solutions

    Innovative solutions for IT workers at home

    Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

    Innovative solutions for IT workers at home

    What is database encryption?

    A moment of reckoning: the need for a strong and global cybersecurity response

    Cloud Security in Banking Market to Witness Huge Growth by 2026 | Microsoft Azure, Trend Micro, Salesforce

    Innovative solutions for IT workers at home

    ZEDEDA Announces Integration with Microsoft Azure IoT to Seamlessly and Securely Orchestrate Distributed Edge Computing Workloads at Scale

    A moment of reckoning: the need for a strong and global cybersecurity response

    ZEDEDA integrates with Microsoft Azure IoT to provide full lifecycle management capabilities

    Innovative solutions for IT workers at home

    SolarWinds Attack: Proof That On-Premises Active Directory Still an Effective Initial Access Vector

    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Affirms Solorigate Attackers Saw Azure, Intune and Exchange Source Code

    8×8 makes raft of updates to platform

    Indonesian Mobile Operator Selects NTT for Microsoft Security Project

    Microsoft To Build New Azure Cloud Data Centers In Greece

    NTT completes Microsoft security project for Indonesian mobile operator

    Trending Tags

    • Donald Trump
    • Future of News
    • Climate Change
    • Market Stories
    • Election Results
    • Flat Earth
  • Tech
    • All
    • Apps
    • Gear
    • Mobile
    • Startup
    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Releases Azure Firewall Premium in Public Preview

    Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

    Veeam Backup & Replication 11: Enhanced data management for a multi-cloud environment

    8×8 makes raft of updates to platform

    Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

    How to use Microsoft Sysmon, Azure Sentinel to log security events

    OPS101 – Securing your Hybrid environment – Part 1 – Azure Security Center

    A moment of reckoning: the need for a strong and global cybersecurity response

    Microsoft Ending Azure Information Protection Connections to Microsoft Defender for Endpoint

    Microsoft To Open Azure Cloud Data Center Region In Spain

    EMC Corporation Townsend security Hewlett-Packard Enterprise Gemalto N.V. Microsoft Azure Google Thales e-security International Business Machines (IBM) Broadcom

    A moment of reckoning: the need for a strong and global cybersecurity response

    Azure Engineer at VillageMD

    Innovative solutions for IT workers at home

    How to Sync On-Premise Active Directory Passwords with Office 365 and Google Apps in Real-Time

    Microsoft Azure Forms Collaboration to Enhance AI in Healthcare

    Azure Defender is now available for all IoT and OT devices

    Telecom Provider Migrates Confidently to Microsoft Azure with Fortinet’s Dynamic Cloud Security Solutions

    Google and Microsoft ID Group Targeting Security Researchers

    Trending Tags

    • Flat Earth
    • Sillicon Valley
    • Mr. Robot
    • MotoGP 2017
    • Golden Globes
    • Future of News
  • Entertainment
    • All
    • Gaming
    • Movie
    • Music
    • Sports
    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Microsoft Flight Simulator Continues to Look Stunning in New Snow Video

    Meet the woman who’s making consumer boycotts great again

    New campaign wants you to raise funds for abuse victims by ditching the razor

    Twitter tweaks video again, adding view counts for some users

    A beginner’s guide to the legendary Tim Tam biscuit, now available in America

    People are handing out badges at Tube stations to tackle loneliness

    Trump’s H-1B Visa Bill spooks India’s IT companies

    Magical fish basically has the power to conjure its own Patronus

    This Filipino guy channels his inner Miss Universe by strutting in six-inch heels and speedos

    Oil spill off India’s southern coast leaves fisherman stranded, marine life impacted

  • Lifestyle
    • All
    • Fashion
    • Food
    • Health
    • Travel
    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Offers More ‘Solorigate’ Advice Using Microsoft 365 Defender Tools

    A moment of reckoning: the need for a strong and global cybersecurity response

    Solar Winds, Office 365 & Shipbuilding…

    Aruba ClearPass Policy Manager Integrates with Microsoft

    Imprivata Expands Collaboration with Microsoft on New Digital Identity Innovations

    Microsoft Seriously Beefs Up Security in Windows Server 2019

    Microsoft Canada’s 10 biggest stories of 2020

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    FAA issues new proposed Boeing 737 MAX pilot training procedures

    AMD breaks revenue records for 2019 and 4Q

    AMD breaks revenue records for 2019 and 4Q

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft and Analog Devices pair on 3D imaging tech

    Microsoft is killing off insecure Cloud App Security cipher suites

    Microsoft is killing off insecure Cloud App Security cipher suites

    Rap group call out publication for using their image in place of ‘gang’

    Meet the woman who’s making consumer boycotts great again

    Trending Tags

    • Golden Globes
    • Mr. Robot
    • MotoGP 2017
    • Climate Change
    • Flat Earth
No Result
View All Result
Azure Security News
No Result
View All Result
Home Tech Apps

Compare the top cloud-based IoT security platforms to protect devices

by AZURE SECURITY NEWS EDITOR
December 11, 2020
in Apps
0
Hackers Cryptojack Microsoft Azure ML Clusters
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

Securing IoT devices has always been a challenge, but with the COVID-19 pandemic forcing enterprise workers out of the office, it has become essential. Many IoT devices are now in widespread use in work-from-home environments with minimal, if any, security protection. While employee laptops possess preprogrammed security against a wide range of threats, IoT devices are much less likely to. Attackers are well aware of the security vulnerabilities that come from widespread work from home, leading to a significant increase in cybersecurity threats. That said, IoT security is more important than ever.

IoT devices can refer to computing devices that use wireless networks to transfer sensor data, or inputs, and/or actuators, or outputs, that interact with the physical world. These connected devices are nonstandard in terms of how users manage and secure them as compared with standard computing devices, like servers, desktops and laptops. IoT devices such as printers and cameras often face the same threats as standard devices but lack the security capabilities that are built into standard devices. This is often due to difficult challenges, such as resource-constrained devices that can’t compute strong security mechanisms, like encryption, access control and logging, to simpler yet often not remedied issues, including devices with preset passwords that never get changed and security teams simply not knowing which devices are connecting the corporate systems.

Cloud-based IoT security platforms, like IoT devices themselves, are incredibly varied. Considering the huge variety of IoT devices and device vendors and the lack of standardization in IoT devices, no IoT security tool will be able to support every IoT device. Buyers must ensure any potential cloud-based IoT security service can sufficiently support the organization’s IoT devices currently in use.

Comparing cloud-based IoT security platforms

The leading cloud-based IoT security services are difficult to compare because each option has fundamentally different architectures, security levels and pricing structures. The latter is particularly challenging, with some service providers having one set of charges for everything they offer and other service providers having highly granular pricing, like a monthly charge for each IoT device it supports, issued commands and network usage. Charges also can vary based on geographic area.

Amazon Web Services

AWS offers two services that work together to provide IoT security capabilities: AWS IoT Device Management and AWS IoT Device Defender. The IoT Device Management service supports a range of basic device management functions, including registering new devices, as well as performing other asset management functions for IoT devices, resetting devices remotely and installing updates. The service can also establish and enforce access control policies for IoT devices in groups.

The IoT Device Defender service is composed of two features called Audit and Detect. The Audit feature continuously looks for deviations from a set of security best practices and then sends admins a report on a scheduled or ad hoc basis. IoT Device Defender administrators can choose which of the security best practices to include in the audit. The Detect feature performs rudimentary anomaly detection by observing device network activity and generating alerts when the observed activity is anomalous compared to expected activity. The Detect feature provides a basic intrusion detection capability that can find compromised IoT devices that are in misuse within botnets or in other ways that generate unexpected volumes or types of network traffic.

Pricing for AWS IoT Device Management has several components, including the number of registered IoT devices, indexing updates, queries performed, issued commands and established tunnels to individual IoT devices for troubleshooting purposes. Pricing for AWS IoT Device Defender has separate usage charges for the Audit feature and the Detect feature.

Cloud-based IoT security platforms feature by feature

Google

Google Cloud IoT Core provides a variety of IoT device management and security capabilities. Cloud IoT Core can register IoT devices and define metadata for each device that can be used for asset management purposes. Each IoT device can obtain a unique cryptographic key pair with Cloud IoT Core for authentication purposes.

Cloud IoT Core manages IoT devices through what are known as protocol bridges. The protocol bridges speak two of the protocols most widely used by IoT devices: HTTP and Message Queuing Telemetry Transport (MQTT). The bridges act as translators between IoT devices that speak HTTP or MQTT and the device management services Cloud IoT Core provides. Cloud IoT Core can send configuration capabilities, including the ability to issue any instructions or commands, to IoT devices through the bridges. IoT devices can then send information about their state back to Cloud IoT Core.

Google also offers supporting services that aren’t limited to IoT devices. Cloud Identity and Access Management (IAM) helps control who can manage groups of IoT devices. Another is Cloud Monitoring, which monitors usage metrics exported by Cloud IoT Core and generates alerts based on the values of these metrics. Its Cloud Logging service offers a range of log management and monitoring services for Cloud IoT Core audit and device logs. However, device logs are not included by default, and there will be charges based on the volume of logs uploaded from devices to Cloud IoT Core.

Pricing for Google Cloud IoT Core is based on the amount of data registered IoT devices send and receive, with some exceptions. Google provides pricing information and a pricing calculator for Cloud IoT Core. There is no additional charge for use of Cloud IAM with Cloud IoT Core, but there are additional charges for the Cloud Logging and Cloud Monitoring services.

Microsoft

Microsoft’s Azure Security Center for IoT service relies on the Azure IoT Hub service. IoT Hub provides basic IoT device management services, including device provisioning, support for other asset management features, authentication for each IoT device with device-unique credentials and issuing commands to IoT devices.

Security Center for IoT offers several security services for IoT devices. For example, it can perform continuous security monitoring for IoT devices to audit their security settings and identify potential security problems. It also offers threat protection by using threat intelligence and machine learning to identify and stop potential risks against IoT devices. It also has incident response capabilities for compromised devices. The extent to which an IoT device can support these security services depends on whether it has the Azure Security Center for IoT security agent installed and running on the device. Security Center for IoT won’t be able to interact with agentless devices to the degree it can interact with devices with the agent installed.

Pricing for Microsoft Azure IoT Hub is based on a tiered structure, with different monthly charges per IoT Hub instance depending on the tier and edition of each instance. Azure Security Center is priced separately from Azure IoT Hub. It uses a two-tiered model — Free and Standard — but only the Standard tier supports IoT devices. Pricing is by IoT device per month and by IoT device transaction.

The benefits of cloud-based IoT security

Cloud-based IoT security platforms can help protect IoT devices from unwanted access or tampering, regardless where users access them from. These services help organizations remotely manage their IoT devices from a single centralized place, with capabilities such as the following:

  • asset registration and enrollment;
  • asset identity verification;
  • vulnerability management and remediation;
  • update installation;
  • configuration setting changes; and
  • remote control actions, including resetting a device, troubleshooting device problems, issuing commands to a device and checking the state of a device.

Some cloud-based services offer additional capabilities for IoT device security, such as the following:

  • auditing how well the device’s security complies with best practices;
  • finding threats through anomaly detection and threat intelligence usage; and
  • automating incident response actions, like alert generation and forensic data collection.

Many cloud-based IoT security platforms also offer integration capabilities, like APIs, which developers can use to customize service usage and support for common protocols that provide interoperability with an organization’s existing enterprise asset management and security management platforms.

Reference:https://searchsecurity.techtarget.com/feature/Protect-devices-with-these-cloud-based-IoT-security-platforms

Share196Tweet123Share49
AZURE SECURITY NEWS EDITOR

AZURE SECURITY NEWS EDITOR

Related Posts

A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Releases Azure Firewall Premium in Public Preview

by AZURE SECURITY NEWS EDITOR
February 26, 2021
0

by Steef-Jan WiggersFOLLOW Microsoft Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. The company...

8×8 makes raft of updates to platform

Advancing the Orchestration of Distributed Edge Applications, ZEDEDA Integrates with Microsoft Azure IoT

by AZURE SECURITY NEWS EDITOR
February 25, 2021
0

It's one thing to build an edge solution for experimental Proof of Concepts or small, localized deployments, and another to...

How to use Microsoft Sysmon, Azure Sentinel to log security events

OPS101 – Securing your Hybrid environment – Part 1 – Azure Security Center

by AZURE SECURITY NEWS EDITOR
February 22, 2021
0

Now more than ever, organizations are challenged with keeping their employees productive working remotely and interacting with their customers over...

A moment of reckoning: the need for a strong and global cybersecurity response

Microsoft Ending Azure Information Protection Connections to Microsoft Defender for Endpoint

by AZURE SECURITY NEWS EDITOR
February 22, 2021
0

Microsoft is planning to end the integration of the Microsoft Defender for Endpoint security solution with the Azure Information Protection...

  • Trending
  • Comments
  • Latest
Microsoft’s CyberX Acquisition Boosts Security of Azure IoT Lineup

AZURE DEFAULT RESOURCE GROUP AND DEFAULT WORKSPACE: WHAT ARE THEY?

December 14, 2020
Microsoft Seriously Beefs Up Security in Windows Server 2019

TCS Launches Cloud Exponence on Microsoft Azure

January 21, 2021
Microsoft Launches Host of Security Products in Time for RSA

Microsoft to add two new Microsoft 365 security, compliance bundles to its line-up

November 26, 2020

Lady Gaga Pulled Off One of the Best Halftime Shows Ever

0

Barack Obama’s Now Mainly Focusing on Wearing This Casual Backwards Hat

0

Watch Justin Timberlake’s ‘Cry Me a River’ Come to Life in Mesmerizing Dance

0
How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft Cloud Announces Three New Vertical Cloud Solutions

February 26, 2021
Innovative solutions for IT workers at home

Privacera Announces Partnership with Talend for Rapid Cloud Data Integration and Governance with Automated Privacy and Compliance

February 26, 2021
Innovative solutions for IT workers at home

What is database encryption?

February 26, 2021
Azure Security News

Copyright © 2020 - Azure Security

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • News
    • Politics
    • Business
    • World
    • Science
  • Entertainment
    • Gaming
    • Music
    • Movie
    • Sports
  • Tech
    • Apps
    • Gear
    • Mobile
    • Startup
  • Lifestyle
    • Food
    • Fashion
    • Health
    • Travel

Copyright © 2020 - Azure Security

Welcome Back!

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In