Focus
Table of Contents

Activate IoT Security

Learn about IoT Security activation.
Where Can I Use This?What Do I Need?
  • From email activation link
  • Commercial deployments
  • Customer Support Portal account
Welcome to IoT Security activation. The IoT Security solution works with next-generation firewalls to dynamically discover and maintain a real-time inventory of the IoT devices on your network. If you are trying to activate IoT Security with the add-on Enterprise License Agreement (ELA), see activate an add-on enterprise license agreement instead.
Because IoT Security requires network traffic data for analysis, you must enable firewalls to forward logs with that data to a cloud logging service that IoT Security can access. There are two types of IoT Security subscriptions:
  • IoT Security Subscription - Doesn't Require Data Lake Subscription: (Available for all IoT Security products) This subscription sends data logs to a cloud logging service that streams them directly to IoT Security without storing them in a data lake.
  • IoT Security Subscription: (Available on Enterprise IoT Security Plus, Industrial OT Security, and Medical IoT Security) This subscription requires a Strata Logging Service instance, which stores the data logs from firewalls. Firewalls forward logs to the logging service, which streams them directly to a Strata Logging Service instance and to IoT Security. You can use an existing, already activated Strata Logging Service instance or buy a new one to use.
In addition to the IoT Security subscription and possibly a Strata Logging Service subscription, you might have also purchased an IoT Security Third-party Integrations Add-on. This allows IoT Security to exchange information about devices, security alerts, and device vulnerabilities with third-party products that provide services such as asset management, network access control (NAC), network management, vulnerability scanning, and security information and event management (SIEM). IoT Security can also enhance the information it has by retrieving data about devices and vulnerabilities from third-party products. IoT Security supports third-party integrations through Cortex XSOAR.
Select Activate Subscription in your email, then use one of the following options: