Unlike IT device vendors, IoT vendors are able to sell hardware that doesn’t include built-in Endpoint Protection, but that doesn’t mean enterprises don’t want it. Without access to the device firmware, enterprises jump through many hoops and employ taxing – and largely ineffective – security strategies and solutions to keep hackers from using IoT devices as an entry point into their networks.
Roundabout IoT security strategies used by security teams are a burden, as devices cannot be managed in a centralized way, and sometimes they are even prevented from fully connecting to the internet. This is not how they were intended to be used, but without Endpoint Protection purpose-built for these devices and delivered by default from the vendor, enterprises are powerless to do much about it.