Activate IoT Security
Table of Contents
Expand all | Collapse all
Activate IoT Security
Learn about IoT Security activation.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Welcome to IoT Security activation. The IoT Security solution works with
next-generation firewalls to dynamically discover and maintain a real-time inventory
of the IoT devices on your network. If you are trying to activate IoT Security
with the add-on Enterprise License Agreement (ELA), see activate an add-on enterprise license
agreement instead.
Because IoT Security requires network traffic data for analysis, you must enable
firewalls to forward logs with that data to a cloud logging service that
IoT Security can access. There are two types of IoT Security
subscriptions:
- IoT Security Subscription - Doesn't Require Data Lake Subscription: (Available for all IoT Security products) This subscription sends data logs to a cloud logging service that streams them directly to IoT Security without storing them in a data lake.
- IoT Security Subscription: (Available on Enterprise IoT Security Plus, Industrial OT Security, and Medical IoT Security) This subscription requires a Strata Logging Service instance, which stores the data logs from firewalls. Firewalls forward logs to the logging service, which streams them directly to a Strata Logging Service instance and to IoT Security. You can use an existing, already activated Strata Logging Service instance or buy a new one to use.
In addition to the IoT Security subscription and possibly a Strata Logging Service subscription, you might have also purchased an
IoT Security Third-party Integrations Add-on. This allows
IoT Security to exchange information about devices, security alerts, and
device vulnerabilities with third-party products that provide services such as asset
management, network access control (NAC), network management, vulnerability
scanning, and security information and event management (SIEM). IoT Security
can also enhance the information it has by retrieving data about devices and
vulnerabilities from third-party products. IoT Security supports third-party integrations through Cortex
XSOAR.
Select Activate Subscription in your email, then
use one of the following options: