With businesses grappling with the complexity of shadow IoT, it’s an opportunity for channel pros and IT integrators to help them get proper tools and infrastructure in place for management and protection, says Kerravala, who adds that there are scanning tools available that look up devices by their MAC address in the Manufacturer Usage Description database. "You can search for devices, find any issues, resolve them, and analyze their network's baseline behavior.”
For example, he says, “If you find an Android device that connects to Peleton.com once a day, you can track it to an exercise cycle. You need to know what all these devices are, set a baseline of normal activity, then catch a device when it changes its normal routine. If the coffee machine connects to the accounting server, it needs to be quarantined."
Once you find devices, the next step is to manage and secure them. Modern tools like those mentioned earlier will trace where these devices connect, says Kerravala. "Network access control vendors like ORDR and Forescout specialize in IoT security." Beaver suggests dedicated IoT discovery and risk management systems provided by vendors such as Securolytics.
MSPs can then offer a managed service to monitor and mitigate any rogue devices in the future.
Kerravala has one final word of advice for channel pros about capitalizing on shadow IoT: "Chaos is opportunity for a channel partner to become a trusted partner to customers."