[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Network Security](https://www.paloaltonetworks.com/cyberpedia/network-security?ts=markdown) 3. [IoT Security](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security?ts=markdown) 4. [What Is IoT Security? Internet of Things Network Security](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security?ts=markdown) Table of contents * What Is IoT Security? Internet of Things Network Security * [Why is IoT security important?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#why-is-iot-security-important?ts=markdown) * [What are the primary IoT security risks and challenges?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#what-are-the-primary-iot-security-risks-and-challenges?ts=markdown) * [Which IoT devices and industries are most vulnerable?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#which-iot-devices-and-industries-are-the-most-vulnerable?ts=markdown) * [How does IoT security work?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#how-does-iot-security-work?ts=markdown) * [What are the essential elements of IoT security?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#what-are-the-essential-elements-of-iot-security?ts=markdown) * [What frameworks, standards, and regulations guide IoT security?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#what-frameworks-standards-and-regulations-guide-iot-security?ts=markdown) * [IoT security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#iot-security-faqs?ts=markdown) * [Building Secure Smart Cities in the Age of 5G and IoT](https://www.paloaltonetworks.com/cyberpedia/smart-cities-in-the-age-of-5g-and-iot?ts=markdown) * [What is an internet operations management program?](https://www.paloaltonetworks.com/cyberpedia/what-is-internet-operations-management?ts=markdown) * [Why Is Internet Operations Management Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-internet-operations-management#why?ts=markdown) * [How Do You Build an Internet Operations Management Program?](https://www.paloaltonetworks.com/cyberpedia/what-is-internet-operations-management#how?ts=markdown) * [Why Is IOM Important for Governments?](https://www.paloaltonetworks.com/cyberpedia/what-is-internet-operations-management#governments?ts=markdown) * [IOM as defined by Senate bill](https://www.paloaltonetworks.com/cyberpedia/what-is-internet-operations-management#iom?ts=markdown) * [What is IT Asset Inventory?](https://www.paloaltonetworks.com/cyberpedia/what-is-it-asset-inventory?ts=markdown) * [What is IT asset inventory?](https://www.paloaltonetworks.com/cyberpedia/what-is-it-asset-inventory#what?ts=markdown) * [Why is IT asset inventory important?](https://www.paloaltonetworks.com/cyberpedia/what-is-it-asset-inventory#why?ts=markdown) * [Why does asset management need to change?](https://www.paloaltonetworks.com/cyberpedia/what-is-it-asset-inventory#change?ts=markdown) * [How should asset management be performed?](https://www.paloaltonetworks.com/cyberpedia/what-is-it-asset-inventory#performed?ts=markdown) * [Why defenders need asset inventory](https://www.paloaltonetworks.com/cyberpedia/what-is-it-asset-inventory#inventory?ts=markdown) * [How to manage asset inventory with Cortex Xpanse](https://www.paloaltonetworks.com/cyberpedia/what-is-it-asset-inventory#xpanse?ts=markdown) * [How to Secure IoT Devices in the Enterprise](https://www.paloaltonetworks.com/cyberpedia/how-to-secure-iot-devices-in-the-enterprise?ts=markdown) # What Is IoT Security? Internet of Things Network Security 6 min. read Table of contents * * [Why is IoT security important?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#why-is-iot-security-important?ts=markdown) * [What are the primary IoT security risks and challenges?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#what-are-the-primary-iot-security-risks-and-challenges?ts=markdown) * [Which IoT devices and industries are most vulnerable?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#which-iot-devices-and-industries-are-the-most-vulnerable?ts=markdown) * [How does IoT security work?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#how-does-iot-security-work?ts=markdown) * [What are the essential elements of IoT security?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#what-are-the-essential-elements-of-iot-security?ts=markdown) * [What frameworks, standards, and regulations guide IoT security?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#what-frameworks-standards-and-regulations-guide-iot-security?ts=markdown) * [IoT security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#iot-security-faqs?ts=markdown) 1. Why is IoT security important? * * [Why is IoT security important?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#why-is-iot-security-important?ts=markdown) * [What are the primary IoT security risks and challenges?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#what-are-the-primary-iot-security-risks-and-challenges?ts=markdown) * [Which IoT devices and industries are most vulnerable?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#which-iot-devices-and-industries-are-the-most-vulnerable?ts=markdown) * [How does IoT security work?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#how-does-iot-security-work?ts=markdown) * [What are the essential elements of IoT security?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#what-are-the-essential-elements-of-iot-security?ts=markdown) * [What frameworks, standards, and regulations guide IoT security?](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#what-frameworks-standards-and-regulations-guide-iot-security?ts=markdown) * [IoT security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-iot-security#iot-security-faqs?ts=markdown) ![An image of many internet enabled devices.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iot-security/what-is-iot-security-video-thumbnail.png) close IoT security is the practice of protecting internet-connected devices and the systems they rely on from unauthorized access, misuse, and disruption. It addresses vulnerabilities introduced by limited device controls, diverse connectivity methods, and inconsistent update mechanisms. Strong IoT security helps prevent device compromise, data exposure, and lateral movement within connected environments. ## Why is IoT security important? IoT security is important because internet-connected devices interact with physical systems and digital networks in ways that create new opportunities. And new vulnerabilities. These devices often operate with minimal controls. Yet they collect, transmit, and act on sensitive data in homes, businesses, and critical infrastructure. Without purpose-built security, IoT systems can be exploited to steal information, disrupt operations, or serve as entry points into larger networks. * 81% of security leaders say their organizations experienced an IoT-focused attack in the past year. * Organizations hit by IoT-targeted breaches were significantly more likely to face costs between $5M--$10M than those hit by traditional IT attacks. * 46% of organizations still struggle to gain visibility into their IoT devices, making risk management extremely difficult. [- Palo Alto Networks \& Starfleet Research, ​​The 2024 Benchmark Report on IoT Security](https://www.paloaltonetworks.com/resources/research/the-2024-benchmark-report-on-iot-security) Not to mention, new use cases emerge faster than security models can adapt. As [artificial intelligence](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai) becomes more embedded in IoT ecosystems---enhancing threat detection, trust management, and device decision-making---it also introduces new attack surfaces that further raise the stakes for securing connected environments. Plus, many devices remain deployed long after their support lifecycles end. | ***Further reading:** [What Is Cyber-Physical Systems Security (CPSSEC)? | Overview](https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-physical-systems-security-cpssec)* ## What are the primary IoT security risks and challenges? IoT environments introduce risk in ways that traditional IT systems don't. Many devices operate outside the reach of standard controls. They're physically exposed. They have limited compute resources. And they're often deployed without clear ownership or long-term support. That's what makes IoT security difficult. It's not just about technology. It's about how these devices are built, deployed, and managed across environments that may not be built for oversight. ![An infographic titled 'IoT security challenges' displays seven orange square icons arranged in two vertical columns against a light gray and white background. The left column contains icons and labels for four challenges: a wrench and gear icon for 'Underpowered devices', a warning symbol on a document for 'Insecure defaults', a checklist with a pen for 'Lack of standardization', and a smartwatch for 'Physical exposure'. The right column shows three more icons: an eye for 'Lack of visibility', a person with a question mark over their head for 'Unclear ownership', and a microchip with a clock face for 'Limited lifecycle support'. Each icon is accompanied by black text identifying the challenge.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iot-security/Iot-Challenges.png "An infographic titled 'IoT security challenges' displays seven orange square icons arranged in two vertical columns against a light gray and white background. The left column contains icons and labels for four challenges: a wrench and gear icon for 'Underpowered devices', a warning symbol on a document for 'Insecure defaults', a checklist with a pen for 'Lack of standardization', and a smartwatch for 'Physical exposure'. The right column shows three more icons: an eye for 'Lack of visibility', a person with a question mark over their head for 'Unclear ownership', and a microchip with a clock face for 'Limited lifecycle support'. Each icon is accompanied by black text identifying the challenge.") Here's where the biggest challenges show up: **Many IoT devices are underpowered.** They lack the processing capacity to run traditional security software or encrypt traffic reliably. **And they often ship with weak defaults,** insecure firmware, or hardcoded credentials that never get changed. **There's also no standardization.** Devices come from different vendors, run different software, and use different communication protocols. That makes it hard to apply consistent policies or updates across a fleet. * 91% of security leaders say IoT device manufacturers do a poor job securing devices from attack. * Manufacturers are projected to increase their use of OT assets by 400% by 2030---most of which were not designed for secure internet connectivity. [- Palo Alto Networks \& Starfleet Research, ​​The 2024 Benchmark Report on IoT Security](https://www.paloaltonetworks.com/resources/research/the-2024-benchmark-report-on-iot-security) **And then there's the lifecycle problem. Devices stay in use long after their support ends.** Or worse, with no support policy at all. Updates are rare. Patch management is nearly impossible. So vulnerabilities linger. **Physical risk matters too. Unlike IT assets locked in data centers, many IoT devices are deployed in the open.** Think parking meters, industrial sensors, or consumer gadgets. If an attacker can get to the device, they may be able to bypass software protections entirely. **Visibility is another challenge. Many IoT devices are invisible to IT teams.** They don't show up in inventory. They aren't monitored. And they may not even be known to security staff. Until something goes wrong. ![An infographic titled 'IoT security risks' features eight orange square icons arranged in two vertical columns on a split gray and white background. The left column displays icons and labels for four risks: a smartwatch for 'Device compromise', a stacked server icon for 'Data exposure', a document with a warning symbol for 'Unauthorized control', and a network graph for 'Lateral movement'. The right column includes four additional icons: a network of connected dots for 'DDoS participation', a circuit board for 'Physical access \& tampering', a heart monitor waveform for 'Lack of visibility \& monitoring', and a microchip for 'Software \& firmware supply chain exposure'. Each icon is paired with a descriptive label in black text.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iot-security/Iot-security-risks.png "An infographic titled 'IoT security risks' features eight orange square icons arranged in two vertical columns on a split gray and white background. The left column displays icons and labels for four risks: a smartwatch for 'Device compromise', a stacked server icon for 'Data exposure', a document with a warning symbol for 'Unauthorized control', and a network graph for 'Lateral movement'. The right column includes four additional icons: a network of connected dots for 'DDoS participation', a circuit board for 'Physical access & tampering', a heart monitor waveform for 'Lack of visibility & monitoring', and a microchip for 'Software & firmware supply chain exposure'. Each icon is paired with a descriptive label in black text.") What happens when these gaps are exploited? * Devices get compromised and used as entry points into larger systems. * [Sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data) is exposed through unencrypted traffic or weak authentication. * Attackers issue commands or take unauthorized control. * [Lateral movement](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement) enables deeper access across networks. * Devices are hijacked into [botnets](https://www.paloaltonetworks.com/cyberpedia/what-is-botnet) and used in large-scale [DDoS](https://www.paloaltonetworks.com/cyberpedia/what-is-a-ddos-attack) attacks. * Supply chain issues introduce hidden vulnerabilities through third-party firmware or components. Ultimately, securing IoT means addressing both the limitations of the devices and the realities of how they're deployed. | ***Further reading:** [What Is the Difference Between IoT and OT Security?](https://www.paloaltonetworks.com/cyberpedia/iot-security-vs-ot-security)* ## Which IoT devices and industries are most vulnerable? ![The diagram illustrates example attack pathways in high-risk IoT environments. At the top, a cloud and internet layer connects to an admin server and a victim server. Arrows show potential attack flows including a 'MITM attack' and a 'DDoS attack'. The middle layer labeled 'Fog' contains IoT gateways, one of which is marked 'IoT gateway affected by Mirai Botnet'. The bottom layer depicts three environments: a smart home with icons for a thermostat, lock, camera, speaker, and appliances; a cellular network with icons for a smartphone, tablet, laptop, and other connected devices; and a healthcare network with icons for CT scan, ultrasound, and MRI machines. Red arrows trace malicious pathways from compromised IoT gateways up through the fog layer into the admin and victim servers.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iot-security/Example-attack-pathways-in-high-risk-IOT-environments.png) Not all IoT environments carry the same level of risk. Some devices are inherently more vulnerable---because of how they're built, where they're deployed, or whether they can be updated and monitored. And some industries rely more heavily on these devices in critical or distributed systems. Basically, the riskiest devices often show up in the riskiest places. Here's a breakdown of high-risk device types and where they tend to appear. | High-risk IoT devices and where they're commonly deployed |||| | Device type | Example use | Why it's vulnerable | Common in | |------------------------|-----------------------------------------------|------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------| | Consumer electronics | Smart TVs, voice assistants, doorbells | Weak defaults and rare security updates | Homes, retail environments | | Home networking gear | Wi-Fi routers, range extenders | Often misconfigured or unmanaged by end users | Residential, small business | | Security systems | Networked cameras, smart locks | Exposed to the internet and often lack strong authentication | Government, commercial, infrastructure | | Healthcare devices | Monitors, wearables, infusion pumps | Handle sensitive data with limited ability to patch or monitor remotely | Hospitals, elder care, telehealth | | Industrial control | Sensors, PLCs, automation units | Long lifespans and limited tamper protections | Manufacturing, utilities, energy | | Connected vehicles | GPS trackers, infotainment systems | High mobility, long update cycles, and external network exposure | Transportation, logistics, consumer | | Public infrastructure | Utility meters, traffic systems, surveillance | Distributed, physically accessible, and often lack IT-level asset management | Cities, municipalities, [critical infrastructure](https://www.paloaltonetworks.com/cyberpedia/what-is-critical-infrastructure) | | Retail / public kiosks | Smart vending machines, self-checkouts | Run on outdated platforms and are physically exposed | Retail, transit, quick-service locations | ## How does IoT security work? ![The diagram illustrates example attack pathways in high-risk IoT environments. At the top, a cloud and internet layer connects to an admin server and a victim server. Arrows show potential attack flows including a 'MITM attack' and a 'DDoS attack'. The middle layer labeled 'Fog' contains IoT gateways, one of which is marked 'IoT gateway affected by Mirai Botnet'. The bottom layer depicts three environments: a smart home with icons for a thermostat, lock, camera, speaker, and appliances; a cellular network with icons for a smartphone, tablet, laptop, and other connected devices; and a healthcare network with icons for CT scan, ultrasound, and MRI machines. Red arrows trace malicious pathways from compromised IoT gateways up through the fog layer into the admin and victim servers.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iot-security/Example-of-IoT-security-model.png) IoT security works by layering protections across the entire device lifecycle. It starts with provisioning: assigning identities, applying secure configurations, and controlling initial access. From there, protections like [encryption](https://www.paloaltonetworks.com/cyberpedia/data-encryption), authenticated updates, and behavior monitoring help maintain trust. Devices enforce local policies, log key events, and report on their own posture when possible. And if something goes wrong, recovery mechanisms help restore the device or safely remove it. Because many IoT systems can't rely on constant updates or central control, strong security depends on designing devices and environments that can defend, detect, and recover on their own. ## What are the essential elements of IoT security? ![The diagram titled 'Essential elements of IoT security' displays a circular hub-and-spoke layout. In the center, a large white circle contains the title text. Surrounding this center are 14 evenly spaced blue circular icons, each labeled with a specific security element and connected to the center by thin gray lines. Starting from the top and moving clockwise, the elements are: 'Policy enforcement,' 'Software \& firmware updates,' 'Trustworthiness \& attestation,' 'Device recovery,' 'Device identification,' 'Secure configuration,' 'Logical access control,' 'Event logging \& monitoring,' 'Data protection,' 'Device provisioning \& deprovisioning,' 'Physical security,' 'Cyber resilience,' 'Secure communications,' and back to 'Policy enforcement.' Each icon is paired with a distinct line-art symbol visually representing the concept. The layout is symmetrical and emphasizes the interconnectedness of all elements in a full-stack IoT security approach.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-iot-security/Essential-elements-of-IoT-security.png) There's no single control that makes an IoT device secure. Security depends on a combination of protections. Each focused on a different aspect of the device's lifecycle, functionality, and environment. You need a full stack of coordinated elements that work together to defend against compromise, maintain operational integrity, and support secure management. * **Device identification:** Each device should have unique logical and physical identifiers to support asset tracking, [access control](https://www.paloaltonetworks.com/cyberpedia/access-control), and monitoring. * **Secure configuration:** Devices must support authorized configuration changes and reject unauthorized ones. Secure defaults and restore points are important. * **Data protection:** Confidentiality and integrity must be maintained for data at rest and in transit. Encryption and secure key management are essential. * **Logical access control:** Only authorized users, services, or systems should be able to interact with the device. Role- or attribute-based policies help limit misuse. * **Software and firmware updates:** Devices should accept only authenticated, integrity-checked updates. Signed firmware and code verification are critical. * **Event logging and monitoring:** Security events like access attempts, config changes, and anomalies should be logged to support detection, investigation, and compliance. * **Device recovery:** Compromised or malfunctioning devices should support restoration to a known-good state or allow for secure data wiping. * **Device provisioning and deprovisioning:** Devices should support secure onboarding with identity validation and configuration enforcement. Deprovisioning should revoke access and erase data. * **Physical security:** Devices in exposed locations should include tamper resistance and protections against key or firmware extraction. * **Cyber resilience:** Devices should maintain safe operations under attack, including [denial-of-service](https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos) resistance and degraded-mode functionality. * **Secure communications:** All network communications should be encrypted and authenticated. Devices must avoid transmitting sensitive data over insecure channels. * **Trustworthiness and attestation:** Devices should be able to report on their own security posture, software state, and configuration integrity to support trust decisions. * **Policy enforcement:** Devices should enforce local rules such as access limits, rate controls, or usage restrictions based on their role and conditions. ## What frameworks, standards, and regulations guide IoT security? Several frameworks and standards help guide how organizations approach IoT security. Some apply broadly across devices and industries. Others are tailored to specific contexts---like consumer products or industrial systems. Here's a quick overview of the most relevant ones: | IoT security frameworks, standards, and regulations |||| | Name | Type | Description | Applies to | |--------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------| | [NIST Cybersecurity Framework (CSF)](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf) | Framework | Provides voluntary, high-level guidance for managing cybersecurity risk. Often used as a foundation for other IoT-specific efforts. | All sectors | | [NIST SP 800-53](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) | Standard | Offers detailed security and privacy controls used by federal systems, adaptable to IoT environments. | Federal and critical infrastructure | | [NIST SP 800-82](https://csrc.nist.gov/pubs/sp/800/82/r3/final) | Standard | Focuses on securing [industrial control systems](https://www.paloaltonetworks.com/cyberpedia/what-is-ics-security), including IoT components used in OT networks. | Industrial / OT | | [NIST IR 8259 \& 8259A](https://csrc.nist.gov/pubs/ir/8259/final) | Baseline guidance | Defines the core baseline of capabilities IoT devices should support for cybersecurity readiness. | IoT device makers | | [NIST IR 8228](https://csrc.nist.gov/pubs/ir/8228/final) | Risk guidance | Offers recommendations for identifying and mitigating IoT-specific risks, including device lifecycle concerns. | General IoT use | | [ETSI EN 303 645](https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf) | Standard | Sets baseline security requirements for consumer IoT devices. Emphasizes outcome-focused controls like password policies and secure updates. | Consumer IoT | | [IoTSF Compliance Framework](https://iotsecurityfoundation.org/wp-content/uploads/2021/11/IoTSF-IoT-Security-Assurance-Framework-Release-3.0-Nov-2021-1.pdf) | Framework | Developed by the IoT Security Foundation to support secure-by-design practices across the device lifecycle. | Commercial and industrial | | [Industrial Internet Security Framework (IISF)](https://www.iiconsortium.org/iisf/) | Framework | Developed by the IIC, focused on securing the Industrial Internet of Things. Emphasizes trustworthiness and secure data flow. | IIoT / industrial | | [PSA Certified](https://www.psacertified.org/what-is-psa-certified/) | Certification | Hardware-based certification scheme backed by Arm and industry partners, aligned to threat models and best practices. | Embedded IoT | | [IoT Security \& Privacy Trust Framework (OTA)](https://www.internetsociety.org/iot/trust-framework/) | Framework | Outlines principles and recommendations for trustworthy consumer IoT products. Focuses on privacy, updates, and disclosures. | Consumer-focused | ![Icon of a document](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-a-firewall/icon-ebook.svg) ## Learn how to unify OT and IT security without compromising productivity, featuring A CISO's Guide to Navigating OT \& IT Convergence in the Manufacturing Industry. [Download eBook](https://www.paloaltonetworks.com/resources/ebooks/the-power-of-ampersand-a-cisos-guide-to-navigating-ot-it-convergence-in-the-manufacturing-industry) ## IoT security FAQs #### What is meant by IoT security? IoT security is the practice of protecting internet-connected devices and their systems from unauthorized access, misuse, or disruption. #### What are the three types of IoT security? You can think of IoT security as falling into three broad categories: 1. Device security -- focuses on protecting the device itself (firmware, access control, physical hardening). 2. Network security -- ensures secure communication and prevents unauthorized access or data interception. 3. Operational security -- covers monitoring, updates, lifecycle management, and response to threats across the IoT ecosystem. #### What are the 4 levels of IoT security? While there's no universal model, a practical way to view IoT security is in four progressive levels: 1. Visibility -- knowing what devices are on your network. 2. Control -- enforcing configuration, access, and communication policies. 3. Protection -- applying encryption, authentication, and segmentation. 4. Resilience -- ensuring systems can detect, respond, and recover from compromise. #### Why do we need IoT security? IoT devices introduce new risks due to their connectivity, limited protections, and interaction with physical systems. Security is essential to prevent data loss, operational disruption, and lateral attacks. #### What is the primary concern in IoT security? The main concern is that IoT devices are often poorly secured yet deeply embedded in critical systems, making them easy targets for attackers and hard to manage securely. #### What is the biggest security concern in IoT? Device compromise is one of the biggest concerns. It can lead to unauthorized access, data theft, lateral movement, or control of critical systems. #### Which methods are used in IoT security? Common methods include device identification, secure configuration, encrypted communications, access control, signed updates, monitoring, and segmentation. Related content [White paper: OT Security Insights: Secure OT-IT Convergence to Keep the Production Lines Working See how to implement the principles of Zero Trust for a resilient OT security framework.](https://www.paloaltonetworks.com/resources/whitepapers/ot-security-insights-secure-ot-it-convergence-to-keep-the-production-lines-working) [eBook: Enterprise Buyer's Guide to IoT Security Grab an overview of the IoT device landscape + principles Zero Trust security provides.](https://www.paloaltonetworks.com/resources/ebooks/the-enterprise-buyer-guide-to-iot-security) [Blog: Risk-based vulnerability prioritization for IoT, OT and MIoT devices Read about a contextual, risk-based approach to vulnerability prioritization for IoT, OT, and Medical IoT devices.](https://www.paloaltonetworks.com/blog/network-security/risk-based-vulnerability-prioritization/) [Report: OMDIA: OT's Digital Transformation Report Find out what your peers are saying about selecting modern OT security technologies.](https://www.paloaltonetworks.com/resources/research/omdia-ots-digital-transformation-report) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20IoT%20Security%3F%20Internet%20of%20Things%20Network%20Security&body=IoT%20security%20is%20the%20practice%20of%20protecting%20internet-connected%20devices%20and%20the%20systems%20they%20rely%20on%20from%20unauthorized%20access%2C%20misuse%2C%20and%20disruption.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-iot-security) Back to Top [Next](https://www.paloaltonetworks.com/cyberpedia/smart-cities-in-the-age-of-5g-and-iot?ts=markdown) Building Secure Smart Cities in the Age of 5G and IoT {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language