zvelo Launches Beta of IoT Security Solution for Device Profiling and Anomaly Detection

zvelo IoT Security automatically recognizes any type of Internet-connected device introduced to a network and flags abnormal traffic

Content categorization and database provider, zvelo announced a beta launch of zvelo IoT Security, a software-based sensor powered by algorithms that provide dynamic device discovery, comprehensive device profiling, and compromised device detection.

Jeff Finn, CEO, zvelo
Jeff Finn, CEO, zvelo

The new solution recognizes IoT devices and Bring Your Own Device (BYOD) that joins a network, without any prior information. Thereafter, it continuously monitors devices to provide timely alerts of suspected activity associated with malware bots, botnet armies, and DDoS attacks.

It has been estimated that there will be 15 billion IoT connected devices and a projected 200 billion devices by 2020. The vast majority of these devices are low-priced, low-end, with low-security features – and thus at a high risk of being compromised.

Jeff Finn, CEO, zvelo, said, “The explosion of IoT devices has thus far outpaced effective security practices to keep them from being too easily compromised. Unless stronger action is taken, IoT breaches will continue to make headlines.”

 “By thoroughly understanding each device’s normal as well as abnormal traffic and behavior, in addition to enabling network security vendors to address targeted devices before harm is done-zvelo IoT Security offers a critical new solution for safeguarding networks.”

How does it work?

zvelo IoT Security integrates a lightweight module into the UTM/Router to perform an agent-less discovery of IoT devices and monitors both devices and traffic. It collects signals and threat intelligence from devices and continuously sends them to the zveloNET cloud for analysis. After this, it provides a zSCORE of the trustworthiness for each device, which represents an assessment of potential risk based on the device’s current behavior.

The solution flags any detected anomalies followed by system admins taking the desired action by configuring network solutions that utilize zvelo IoT Security. In addition to IoT devices, zvelo IoT Security supports PCs, smartphones, tablets, printers, scanners, Bluetooth devices, IP phones and systems, security video and alarm devices, and industrial and manufacturing devices.

End users of IoT products can freely add devices to their networks knowing that any malicious activity will be automatically identified and addressed through zvelo IoT Security.

Read Also: Real Time Anomaly Detection: Solving Problems, Seizing Opportunities

How is Zvelo’s security product different?

zvelo IoT Security goes beyond the basic threat detection and achieves dynamic device discovery by inspecting all seven layers of a network-connected device’s OSI model.

It’s unique ability to identify any device by its communications fingerprint provides a much deeper and detailed detection of anomalous traffic and behavior, unlike previous alternatives. This empowers customers to make fully informed decisions for handling devices across their networks.

Customers integrating zvelo IoT Security into their solutions are equipped with the most detailed IoT device information available.

Designed for integration in an OEM model

zvelo IoT Security is a solution designed for integration in an Original Equipment Manufacturer (OEM) model with wireless routers, SMB-to-enterprise level gateway routers, or UTM appliances (and supports WiFi, Bluetooth, Lora, and narrowband networks). These vendors can leverage zvelo’s new solution to differentiate their products with unprecedented IoT security, device profiling, and anomaly detection capabilities.

Publicly owned-zvelo is open to prospective OEM vendor partners interested in beta participation and is providing general availability features and dates.

Read Also: The App Trap: Why Every Mobile App Needs Anomaly Detection

Spread the love
Previous ArticleMindTickle Advisory Board Features Leaders from AppDynamics, BloomReach, Cloudera and moreNext ArticleThe Portal Extends Its Services to Startups to Fill Up Their Resource Gaps

Leave a Reply

Your email address will not be published. Required fields are marked *