![Background](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/background-video-still.webp) [![Palo Alto Networks Logo](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/pan-logo.svg)](https://www.paloaltonetworks.com)[Get Your Report](#next-steps) [1Intro](#hero)[2Landscape](#device-landscape)[3Gaps](#coverage-gaps)[4Vulnerabilities](#vulnerabilities)[5EOL Software](#eol-software)[6IOT Risks](#iot-risks)[7Takeaways](#key-takeaways)[8Next Steps](#next-steps) Device security threat report # Do You Really Know Every Device on Your Network? Every connection, every endpoint, every overlooked system matters. Discover what our analysis of **27M+ devices** reveals about today's enterprise risks --- highlighting **blind spots, vulnerabilities, and urgent threats** you need to know. [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/mouse-Scroll.svg) Scroll to discover](#device-landscape) THE DEVICE LANDSCAPE ## Know your device landscape --- every asset, every vulnerability, every connection. We studied more than **27 million devices** for this analysis. Adversaries thrive on gaps in knowledge: ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-blindspot.svg) Blind spots in asset inventories ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-risk.svg) Unknown risks ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-deprecated.svg) Deprecated protocols ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-applications.svg) Unmanaged applications ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-dependencies.svg) Overlooked dependencies [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/mouse-Scroll.svg) Scroll to see gaps](#coverage-gaps) ENDPOINT COVERAGE GAPS ## There are significant gaps in endpoint coverage. Coverage gaps leave enterprises exposed, creating opportunities for adversaries to exploit weaknesses in security posture and magnify risk across the entire network. 0 % Nearly 39% of IT devices registered in Active Directory lack an active endpoint agent. 0 % 33% of devices in corporate networks are unmanaged, which expands the attack surface [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/mouse-Scroll.svg) Scroll for vulnerabilities](#vulnerabilities) DEVICE VULNERABILITIES ## Some device types are more exposed than others. Before diving into the rankings, it's important to note that devices differ not just in function but also in how exposed they are to attackers. Systems that are always-on, widely connected, or critical to business operations can become high‑value targets. The most vulnerable device types include, in order: video conferencing and video streaming devices, network equipment, PCs, and IT servers. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-consumer-electronics.svg) ### Consumer Electronics ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-it-servers.svg) ### IT Servers ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-network-equip.svg) ### Network Equipment ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-netsec-equip.svg) ### Network Security Equipment ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-personal-computers.svg) ### Personal Computers ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-smart-tv.svg) ### Smart TV ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-mobile.svg) ### Smartphones or Tablets ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-video-conference.svg) ### Video Conference and Video Streaming ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-virtual-machine.svg) ### Virtual Machines ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-set2-wearables.svg) ### Wearables [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/mouse-Scroll.svg) Scroll for EOL systems](#eol-software) END-OF-LIFE SOFTWARE ## Outdated systems = persistent risk. End-of-Life (EOL) software presents a persistent risk on devices. 26% of Linux systems and 8% of Windows systems are running on EOL versions of operating systems. 0 % ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/logo-Linux.svg) Linux Systems 0 % ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/logo-Windows.svg) Windows Systems [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/mouse-Scroll.svg) Scroll for IOT risks](#iot-risks) IOT RISKS ## High-risk devices fuel high-risk traffic. **48.2%** of all network connections come from high-risk IoT devices. 0 Network Connections Approximately **21% of IoT devices** have at least one known vulnerability, introducing systemic risk into enterprise networks. 0 IoT Devices [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/mouse-Scroll.svg) Scroll for key takeaways](#key-takeaways) KEY TAKEAWAYS ## From exposure to action. To move from understanding the risks to actively mitigating them, organizations need a clear set of priorities. The following pillars summarize the essential actions every enterprise should consider. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-sec6-proactive-security.svg) Proactive Security Essential ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/hand.svg) Threats evolve, requiring a proactive security program. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-sec6-deep-visibility.svg) Deep Visibility is Key ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/hand.svg) Go beyond device counts to understand attributes, vulnerabilities, and interactions. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-sec6-context-action.svg) Blind spots in asset inventories ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/hand.svg) Connect exposures to adversary behavior and disrupt entire attack paths. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-sec6-asset-intelligence.svg) Contextualized Action ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/hand.svg) Know what assets do, how they're connected, their vulnerabilities, and business importance. ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/icon-sec6-ecosystem.svg) Ecosystem Management Vital for Proactive Stance ![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/hand.svg) Every element in the network can impact overall security; to be proactive you must understand the dynamics of all elements in the landscape. [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/mouse-Scroll.svg) Scroll to next steps](#next-steps) next step ## Eager to dive into the details? ![Report Cover](https://www.paloaltonetworks.com/content/dam/pan/en_US/includes/igw/device-security/images/report-cover.webp) There is a lot more about device security risks and the ways in which they can be secured in the 2025 Device Security Threat Report. Get your copy today. {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language