Microsoft NCE Defender for IoT for Education
Complete IoT and ICS/OT security
Asset discovery and context
Use a combination of passive and active agentless network monitoring to get a complete asset inventory and context such as protocols, communications, and backplane layouts.
Risk-based vulnerability management
Improve your security posture, minimize the cyberattack surface, and eliminate vulnerabilities using a risk-prioritized approach that identifies and visualizes the most likely paths of cyberattack.
Cyberthreat detection with IoT and OT behavioral analytics
Identify cyberattacks using IoT-aware and OT-aware cyberthreat intelligence, behavioral analytics, and machine learning that takes advantage of full-fidelity packet captures.