channel company logo

Cyber-Physical Vulnerability Remediation

Viakoo Makes Things Work Securely

Unmanaged and IoT devices are the fastest growing attack surface impacting all types of organizations. Viakoo remediates cyber vulnerabilities by
automating firmware updates, certificate management, and password policy enforcement.
  • 762 Subscribers
  • 24 talks

Viakoo Makes Things Work Securely

Unmanaged and IoT devices are the fastest growing attack surface impacting all types of organizations. Viakoo remediates cyber vulnerabilities by
automating firmware updates, certificate management, and password policy enforcement.
  • 762 Subscribers
  • 24 talks

On-demand talks

How Viakoo Benefits Critical Infrastructure

How Viakoo Benefits Critical Infrastructure

All forms of critical infrastructure share in common that they have a massive number of IoT devices such as security cameras, access control, and smart
building systems, all of which need to be accounted for, monitored, and maintained to ensure operational performance. Viakoo provides automation to
ensure all IoT and security systems are visible, operational, and secure. Viakoo is used by leading organizations across all verticals to improve their security …

How Viakoo Benefits Corporate Campuses

How Viakoo Benefits Corporate Campuses

Corporate campus environments have a massive number of IoT devices such as security cameras, access control, and smart building systems, all of which
need to be accounted for, monitored, and maintained for performance and cybersecurity reasons. Viakoo provides automation to ensure all IoT and security
systems are visible, operational, and secure. Viakoo is used by leading organizations across all verticals to improve their security posture while reducing cos…

How Viakoo Benefits Higher Education Organizations

How Viakoo Benefits Higher Education Organizations

Higher education represents one of the most demanding environments for physical and cyber security, with unique requirements such as Clery Act reporting,
PCI and HIPAA compliance, and multiple constituencies operating within the campus. Viakoo provides automation to ensure all IoT and security systems are
visible, operational, and secure. Viakoo is used by some of the leading colleges and universities to improve their security posture while reducing costs.

How Viakoo Benefits Data Center Security Teams

How Viakoo Benefits Data Center Security Teams

Data Centers have some of the most demanding security requirements in the world, including physical security, cyber security, and the need to maintain
compliance to PCI, SOC-2, and other standards. Viakoo provides automation to ensure all IoT and security systems are visible, operational, and secure.
Viakoo is used by some of the leading data center organizations in the world to improve their security posture while reducing costs.

How Viakoo Benefits Healthcare Security Teams

How Viakoo Benefits Healthcare Security Teams

Healthcare organizations have needs for physical and cybersecurity; Viakoo provides automation to ensure all IoT and security systems are visible,
operational, and secure. Viakoo is used by some of the leading healthcare organizations in the world to improve their security posture while reducing costs.

Application Context Accelerates IoT Discovery and Remediation

Application Context Accelerates IoT Discovery and Remediation

Many organizations have adopted agentless asset discovery to improve IoT security, and reports from the field are that it takes longer than expected to
deploy and even longer to effectively remediate IoT device vulnerabilities. In part this is because asset discovery alone does not provide the context that IoT
devices operate in, especially when it comes to the overall application workflow and how all elements need to work together in a tightly coupled fashion. Thi…

Secure Our (IoT) World:  Cybersecurity Awareness Month

Secure Our (IoT) World: Cybersecurity Awareness Month

This webinar takes CISA's theme for 2023 Cybersecurity Awareness Month (Secure Our World) and focuses on what that means for IoT devices, specifically in
the enterprise. Securing IoT has specific requirements when it comes to application-based asset discovery, device remediation, and ensuring compliance to
internal and external standards. Attend this webinar and come away with a prioritized list of what matters most in order to Secure Our IoT World.

The Dead End of Using Agents For IoT Security

The Dead End of Using Agents For IoT Security

Automation is critical to achieving IoT security at scale across fleets of devices. Using solutions that require agents being placed on devices defeats those
advantages, and will ultimately create problems in both scaling and adding new devices that may not be supported by agents. Likewise, the solutions used
for IoT security must be easy to set up at scale and capable of managing devices across multiple sites and locations. This webinar goes into best practices …