Microsoft NCE Defender for IoT for Education

Complete IoT and ICS/OT security

Asset discovery and context

Use a combination of passive and active agentless network monitoring to get a complete asset inventory and context such as protocols, communications, and backplane layouts.

Risk-based vulnerability management

Improve your security posture, minimize the cyberattack surface, and eliminate vulnerabilities using a risk-prioritized approach that identifies and visualizes the most likely paths of cyberattack.

Cyberthreat detection with IoT and OT behavioral analytics

Identify cyberattacks using IoT-aware and OT-aware cyberthreat intelligence, behavioral analytics, and machine learning that takes advantage of full-fidelity packet captures.