09/09/2025 | News release | Distributed by Public on 09/09/2025 07:04
On August 14, we introduced a major step forward in device protection : Palo Alto Networks Device Security, the evolution of Internet of Things (IoT)/operational technology (OT) security that empowers organizations to discover, assess, and proactively secure every device across their enterprise.
From traditional IT endpoints to BYOD to specialized IoT and OT devices, the modern enterprise has become an interconnected ecosystem, and with it, the attack surface has exploded. Security teams are now forced to navigate siloed tools, fragmented visibility and endless alerts, making it harder than ever to stay ahead of risk.
Blind spots in device visibility translate directly into blind spots in risk, leaving organizations vulnerable to breaches, ransomware and operational disruption.
The proliferation of devices has led to a fragmented approach to security, which can result in siloed risk information and visibility blind spots. In order to accurately assess device level risk, prioritize and mitigate, organizations need to understand their entire environment, spanning multiple assets and network segments.
-Hollie Hennessy, Omdia
Palo Alto Networks Device Security was built to close those gaps. By unifying device protection across managed, unmanaged and IoT/OT assets in one AI-first platform, customers can now take control of their entire device ecosystem with confidence. We go beyond discovery to deliver end-to-end protection, powered by AI and automation. Device Security delivers on three critical areas where customers need the most help: aggregative visibility, risk assessment & prioritization, and proactive mitigation.
Aggregated Visibility
Every security team knows the frustration: dozens of tools, siloed data and still the same question: "What devices are actually on my network right now?" Device Security changes the game by delivering a single source of truth for all devices across IT, IoT and OT environments.
Instead of chasing down asset spreadsheets or relying on incomplete endpoint coverage, Device Security builds a holistic device inventory enriched with over 2,000 identity and security posture attributes. This intelligence is pulled from your existing infrastructure-including Palo Alto Networks Next-Generation Firewalls (NGFW), security service edge (SSE) and IT tools-and then further enhanced with traffic monitoring, API integrations, and even uses generative AI to find, understand and glean critical device information from vendor datasheets and websites.
The result is comprehensive visibility that actually scales, no matter how complex your environment is. Customers no longer have to waste cycles reconciling data across 30 to 40 different tools. With aggregated visibility, you not only see what's out there, you understand what those devices are, how they behave, what risks they bring and where the blind spots are hiding. Device Security combines static device identity and risk attributes, live network traffic/exposure and firewall policy coverage in a single pane of glass. This aggregated visibility sets a solid foundation to address the increasingly complex risk prioritization challenges faced by organizations due to data siloes and fragmented visibility.
Risk Assessment & Prioritization
The device sprawl challenge isn't just about knowing what's connected, it's about knowing what's dangerous. Security teams today are buried under alerts, vulnerabilities and false positives, making it almost impossible to separate real threats from background noise.
Device Security cuts through that noise with multifactor risk scoring. Device Security surfaces the few risks that matter most by analyzing a device's vulnerabilities, including CVEs, CVSS/EPSS scores and threat landscape/exploitation in the wild); its security hygiene; its exposure to the network; and the presence of compensating controls, such as EDR and virtual patching.
This approach reduces alert fatigue by up to 90%, enabling teams to focus their energy where it counts. Imagine shifting from sifting through thousands of vulnerabilities to acting on the handful of devices that present the highest business risk. It's about turning reactive firefighting into proactive, high-confidence decision making.
Device Security's dashboards and proactive monitoring have given our team the visibility and actionability we need to secure our environment. It streamlines our data and helps us make smarter decisions, faster.
-Ryan Buckner, Belden
Proactive Risk Mitigation
Visibility and prioritization are only valuable if you can act on them. Device Security empowers teams to go beyond identifying risks, it enables proactive mitigation before attackers can exploit them.
With Precision AIⓇ-powered recommendations, Device Security helps teams close gaps with speed and accuracy. With Advanced Device-ID, you can create dynamic policies, based on contextual device identity and risk attributes, that follow devices wherever they go, ensuring consistent enforcement. For example, you can instantly restrict network access for any unmanaged laptop missing endpoint protection, regardless of which segment it's connected to.
This proactive model flips the script: instead of waiting for the next breach to expose a weakness, Device Security equips organizations to address risks before they become incidents.
Device Security is able to consolidate data, achieving granular control through its innovative adaptive device identity and risk-based policy. This enables context-aware segmentation and enforcement that aligns with operational priorities, from managed IT endpoints to specialized unmanaged systems, which is a major step forward.
-Hollie Hennessy, Omdia
Secure Your Devices Now
Device Security isn't just another point solution: it's built natively into Strata Cloud Manager so that you can experience the efficiency gains of platformization. That means simplified deployment, continuous visibility and actionable protection across every device in your enterprise.
Ready to see it in action? Watch our Device Security overview video now.
With Device Security, organizations can finally move from reactive firefighting to proactive protection, ensuring that no device, managed or unmanaged, becomes the weak link in their defense.
Resources