{"id":79533,"date":"2023-07-10T14:32:21","date_gmt":"2023-07-10T21:32:21","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/ebook-when-ransomware-meets-iot-and-ot-lp-copy\/"},"modified":"2024-04-01T10:36:45","modified_gmt":"2024-04-01T17:36:45","slug":"ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/","title":{"rendered":"Detecting and Responding to Mixed IT\/IoT\/OT Threats with XDR"},"content":{"rendered":"<p>WHITE PAPER<\/p>\n<h1>Detecting and Responding to Mixed IT\/IoT\/OT Threats with XDR<\/h1>\n<h4>Ransomware Protection in the Age of IoT and OT Threats<\/h4>\n<p>The increased attack surface requires new, superior security approaches to detect and respond to threats that leverage a combination of device types as part of an attack. Tools that monitor disparate asset types without correlating events with other logs won\u2019t detect a cross-device attack that is underway \u2013 which is exactly what threat actors are counting on. <\/p>\n<p>With its R4IoT proof-of-concept ransomware, Forescout Vedere Labs has demonstrated how attackers could exploit an IoT device to gain access and move laterally in an IT network and impact the OT network.  <\/p>\n<p>In this eBook, you\u2019ll see how Forescout XDR, an extended detection and response (XDR) solution, can thwart sophisticated cross-device attacks like the one simulated in R4IoT. Gain insight into the vital role of: <\/p>\n<p>Collecting telemetry and logs from a wide range of sources (including security tools, applications, infrastructure, cloud and other enrichment sources)<br \/>\nCorrelating attack signals to generate high-fidelity threats for analyst investigation<br \/>\nEnabling automated response actions across the enterprise \n<h3>Get White Paper<\/h3>\n\n<p>Notice of Collection<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WHITE PAPER Detecting and Responding to Mixed IT\/IoT\/OT Threats with XDR Ransomware Protection in the Age of IoT and OT Threats The increased attack surface requires new, superior security approaches to detect and respond to threats that leverage a combination of device types as part of an attack. Tools that monitor disparate asset types without [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":0,"parent":0,"menu_order":53,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-79533","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Protection in The Age of IoT and OT Threats<\/title>\n<meta name=\"description\" content=\"Whether it&#039;s the exploitation of IoT devices for initial access, deployment of cryptominers in IT devices, or use of poor OT security, these attacks can cause significant disruptions and financial losses, with sophisticated ransomware gangs often targeting multiple companies or government agencies at once.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Protection in The Age of IoT and OT Threats\" \/>\n<meta property=\"og:description\" content=\"Whether it&#039;s the exploitation of IoT devices for initial access, deployment of cryptominers in IT devices, or use of poor OT security, these attacks can cause significant disruptions and financial losses, with sophisticated ransomware gangs often targeting multiple companies or government agencies at once.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-01T17:36:45+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/\",\"url\":\"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/\",\"name\":\"Ransomware Protection in The Age of IoT and OT Threats\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"datePublished\":\"2023-07-10T21:32:21+00:00\",\"dateModified\":\"2024-04-01T17:36:45+00:00\",\"description\":\"Whether it's the exploitation of IoT devices for initial access, deployment of cryptominers in IT devices, or use of poor OT security, these attacks can cause significant disruptions and financial losses, with sophisticated ransomware gangs often targeting multiple companies or government agencies at once.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detecting and Responding to Mixed IT\/IoT\/OT Threats with XDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Protection in The Age of IoT and OT Threats","description":"Whether it's the exploitation of IoT devices for initial access, deployment of cryptominers in IT devices, or use of poor OT security, these attacks can cause significant disruptions and financial losses, with sophisticated ransomware gangs often targeting multiple companies or government agencies at once.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Protection in The Age of IoT and OT Threats","og_description":"Whether it's the exploitation of IoT devices for initial access, deployment of cryptominers in IT devices, or use of poor OT security, these attacks can cause significant disruptions and financial losses, with sophisticated ransomware gangs often targeting multiple companies or government agencies at once.","og_url":"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-04-01T17:36:45+00:00","twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/","url":"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/","name":"Ransomware Protection in The Age of IoT and OT Threats","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"datePublished":"2023-07-10T21:32:21+00:00","dateModified":"2024-04-01T17:36:45+00:00","description":"Whether it's the exploitation of IoT devices for initial access, deployment of cryptominers in IT devices, or use of poor OT security, these attacks can cause significant disruptions and financial losses, with sophisticated ransomware gangs often targeting multiple companies or government agencies at once.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/ebook-detecting-responding-to-mixed-it-iot-ot-threats-with-xdr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Detecting and Responding to Mixed IT\/IoT\/OT Threats with XDR"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=79533"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79533\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=79533"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=79533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}