Perytons IoT Defense
Allows automatic monitoring and analysis of the IoT last-mile communications. Sniffing probes placed in key points of the network to collect data and send it to the cloud, where it is decoded according to the specific protocol type and version, and all information is extracted and stored. Automated scripts review the data to detect anomalies and potential malicious behavior. System generates alerts and alarms indicating potential security breaches. An overlay that is not part of the operational IoT data, it is not exposed or vulnerable to hacking attacks or protocol interoperability issues. It acts as an inspection and watchdog tool for the system integrator, network operator or the corporate IT manager.