SHARE
Facebook X Pinterest WhatsApp

NetSTAR Introduces New IoT Device Security Solution

thumbnail
NetSTAR Introduces New IoT Device Security Solution

hand press on IOT or internet of things button on virtual screen

The new IoT security solution will be available as part of NetSTAR’s inCompass threat intelligence product.

Written By
thumbnail
Sue Walsh
Sue Walsh
Mar 2, 2020

NetSTAR has enhanced its inCompass® threat intelligence solution, amping up its cybersecurity capability to detect threats to IoT security.

As the world depends more and more on IoT devices, like smart TVs, wearables, home/ factory automation, manufacturing sensors, smart city/ utility sensors, and more, the threat potential to IoT security also grows.

IoT devices continue to deploy on an increasingly larger scale, and many have little — if any — protection from attacks. NetSTAR’s inCompass® enhancements improve its malware detection functionality.

Those improvements include a honeypot system using both real and emulated IoT devices and services to observe attacks. While an increase in short-lived malware and more complex attack patterns hamper conventional honeypot systems from detecting all threats, inCompass has more capabilities.

The new system enables detection of unauthorized attempts that traditional honeypot setups might miss. It can also execute more extensive, immediate threat countermeasure data.

Daniel Ashby, SVP of NetSTAR, says: “NetSTAR is leveraging threat countermeasure data based on the IoT honeypot systems. We have multiple servers processing the honeypot system data, categorizing associated IPs as malicious, and updating our global inCompass® database so that our technology and telco partners have up-to-date visibility into these security vulnerabilities.” 

Ashby says, “Our OEM partners use this intelligence to power their web filtering solutions, enhance their threat information capabilities, and create new network policies around IoT devices.”

NetSTAR’s honeypot system uses a large pool of IP addresses and multiple IoT devices to detect attacks along with the virtual environment to monitor attacks against ports. Researchers use Telnet, HTTP, downloads and remote connections to observe these short-lived attacks and identify IP addresses connected to botnet attacks.

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

New Frontiers of IAM: Reaching Great Heights with 2024 Trends
Ronak D. Jain
May 22, 2024
Application Security for IoT: 10 Best Practices
Sagar Nangare
Feb 21, 2023
The Importance of Ensuring IoT System Security
Is Nanotechnology Ready to Enter the IoT Security War?
Bernard Brode
Apr 12, 2022

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.