{"id":82407,"date":"2023-09-25T16:34:24","date_gmt":"2023-09-25T23:34:24","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/dynamic-network-segmentation-zero-trust-copy\/"},"modified":"2024-03-08T09:58:20","modified_gmt":"2024-03-08T17:58:20","slug":"the-enterprise-of-things-security-report-state-of-iot-security","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/","title":{"rendered":"The Enterprise of Things Security Report: The State of IoT Security"},"content":{"rendered":"<p>RESEARCH REPORT<\/p>\n<h1>The Enterprise of Things Security Report: Insights into IoT Security<\/h1>\n<h2>Analyzing IoT Security Risks Across Industries<\/h2>\n<p>In this first edition of The Enterprise of Things Security Report, Forescout Research Labs analyzed data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state of enterprise IoT cybersecurity. This information comes from one of the world\u2019s largest repositories of connected device data, the Device Cloud.<\/p>\n<p>To date, this is the most comprehensive study of its kind. Some of the key findings include:<\/p>\n<p>Smart buildings, medical devices, networking equipment and VoIP phones represent the riskiest IoT device groups.<br \/>\nSix of the top 10 riskiest IoT device types fall into the categories of medical devices and networking equipment.<br \/>\nWindows workstations represent a major cybersecurity risk to organizations, with over 30% of managed devices in manufacturing and over 35% in healthcare running recently unsupported Windows versions.<br \/>\nCommonly exploited network services like Telnet are found in all five industry verticals.\n<h3>Get Research Report<\/h3>\n\n<p>Notice of Collection<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RESEARCH REPORT The Enterprise of Things Security Report: Insights into IoT Security Analyzing IoT Security Risks Across Industries In this first edition of The Enterprise of Things Security Report, Forescout Research Labs analyzed data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state [&hellip;]<\/p>\n","protected":false},"author":147,"featured_media":82793,"parent":0,"menu_order":47,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[666],"class_list":["post-82407","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Enterprise of Things Security Report: The State of IoT Security<\/title>\n<meta name=\"description\" content=\"Download this security report from Forescout Research Labs where they analyze data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state of enterprise IoT cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Enterprise of Things Security Report: The State of IoT Security\" \/>\n<meta property=\"og:description\" content=\"Download this security report from Forescout Research Labs where they analyze data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state of enterprise IoT cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T17:58:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/Thumbnail-enterprise-of-things.png\" \/>\n\t<meta property=\"og:image:width\" content=\"892\" \/>\n\t<meta property=\"og:image:height\" content=\"803\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/\",\"url\":\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/\",\"name\":\"The Enterprise of Things Security Report: The State of IoT Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/Thumbnail-enterprise-of-things.png\",\"datePublished\":\"2023-09-25T23:34:24+00:00\",\"dateModified\":\"2024-03-08T17:58:20+00:00\",\"description\":\"Download this security report from Forescout Research Labs where they analyze data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state of enterprise IoT cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/Thumbnail-enterprise-of-things.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/Thumbnail-enterprise-of-things.png\",\"width\":892,\"height\":803,\"caption\":\"Enterprise Of Things Cybersecurity for IoT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Enterprise of Things Security Report: The State of IoT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Enterprise of Things Security Report: The State of IoT Security","description":"Download this security report from Forescout Research Labs where they analyze data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state of enterprise IoT cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/","og_locale":"en_US","og_type":"article","og_title":"The Enterprise of Things Security Report: The State of IoT Security","og_description":"Download this security report from Forescout Research Labs where they analyze data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state of enterprise IoT cybersecurity.","og_url":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-03-08T17:58:20+00:00","og_image":[{"width":892,"height":803,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/Thumbnail-enterprise-of-things.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/","url":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/","name":"The Enterprise of Things Security Report: The State of IoT Security","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/Thumbnail-enterprise-of-things.png","datePublished":"2023-09-25T23:34:24+00:00","dateModified":"2024-03-08T17:58:20+00:00","description":"Download this security report from Forescout Research Labs where they analyze data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state of enterprise IoT cybersecurity.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/Thumbnail-enterprise-of-things.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/Thumbnail-enterprise-of-things.png","width":892,"height":803,"caption":"Enterprise Of Things Cybersecurity for IoT"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/the-enterprise-of-things-security-report-state-of-iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"The Enterprise of Things Security Report: The State of IoT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/Thumbnail-enterprise-of-things.png","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/82407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=82407"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/82407\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/82793"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=82407"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=82407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}