about
Network.IOT by PAI
The Product
Network.IOT is an application for your computer and smartphone that allows you to secure, manage and monitor the security settings of all smart devices within your network. The problem is that most IOT and smart home devices are very insecure and many are operated with default passwords and insecure factory settings. We secure the access points of all devices to ensure that malicious individuals don’t take advantage of the default, poor quality security of these devices. PAI will provide patch management to ensure that your security and smart home software is up to date.
What it does
When you launch the app, it will find all devices with default settings and automatically change them to security hardened ones. The user will be able to add and remove IOT devices freely with the option to add guest devices. The application passively runs in the background to detect any malicious activity and quarantine devices if they become infected. For most smart devices it can take up to 20 minutes to set up a security or management platform but with Network.IOT, the user can secure all of their smart home devices with a click of a button.
Why is this important?
Almost all IOT security companies fail to protect the smart home devices before an attack and only notify the admin after an attack happened. While most devices allow the user to view and change some settings, some changes are difficult to perform as an end-user. Network.IOT allows the admin to secure a large number of devices from a single workstation while also securing the network and changing passwords before attacks happen.
How does it work?
Network.IOT scans the network for open telenet, ssh, and other popular protocols, then tests to see if they are using default passwords. Essentially we are running our very own specialized version of Mirai against every home, to secure it instead of to conscript it into a botnet. We also look at the manufacturer's update schedule, and apply patches when a patch has been released, preventing hackers from invoking a malicious patch without permission.