{"id":3748,"date":"2019-06-18T08:54:43","date_gmt":"2019-06-18T08:54:43","guid":{"rendered":"https:\/\/www.esds.co.in\/kb\/?p=3748"},"modified":"2019-06-18T08:54:43","modified_gmt":"2019-06-18T08:54:43","slug":"what-is-iot-security","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/","title":{"rendered":"What is IoT security?"},"content":{"rendered":"<p><strong>IoT<\/strong> <strong>security<\/strong> refers to the act of securing the devices connected via IoT as well as the networks they are connected to. IoT security can be achieved by the means of an Integrated solution that can deliver visibility, segmentation, and protection throughout the network infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IoT security refers to the act of securing the devices connected via IoT as well as the networks they are connected to. IoT security can be achieved by the means of an Integrated solution that can deliver visibility, segmentation, and protection throughout the network infrastructure.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[380],"tags":[905],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.9.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is IoT security? - ESDS Official Knowledgebase<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is IoT security? - ESDS Official Knowledgebase\" \/>\n<meta property=\"og:description\" content=\"IoT security refers to the act of securing the devices connected via IoT as well as the networks they are connected to. IoT security can be achieved by the means of an Integrated solution that can deliver visibility, segmentation, and protection throughout the network infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ESDS Official Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESDSdc\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-18T08:54:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ESDSDataCenter\" \/>\n<meta name=\"twitter:site\" content=\"@ESDSDataCenter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#website\",\"url\":\"https:\/\/www.esds.co.in\/kb\/\",\"name\":\"ESDS Official Knowledgebase\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.esds.co.in\/kb\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/#webpage\",\"url\":\"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/\",\"name\":\"What is IoT security? - ESDS Official Knowledgebase\",\"isPartOf\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/#website\"},\"datePublished\":\"2019-06-18T08:54:43+00:00\",\"dateModified\":\"2019-06-18T08:54:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/#\/schema\/person\/6135b08d815e89f22c23132266828734\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/\",\"url\":\"https:\/\/www.esds.co.in\/kb\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/\",\"url\":\"https:\/\/www.esds.co.in\/kb\/what-is-iot-security\/\",\"name\":\"What is IoT security?\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#\/schema\/person\/6135b08d815e89f22c23132266828734\",\"name\":\"ESDS\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3fc2c750c42cfa0951666754ff22b33a?s=96&d=mm&r=g\",\"caption\":\"ESDS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/3748"}],"collection":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/comments?post=3748"}],"version-history":[{"count":1,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/3748\/revisions"}],"predecessor-version":[{"id":3749,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/3748\/revisions\/3749"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/media?parent=3748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/categories?post=3748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/tags?post=3748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}