{"id":39320,"date":"2021-01-27T18:00:31","date_gmt":"2021-01-27T18:00:31","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92632"},"modified":"2021-01-27T18:00:31","modified_gmt":"2021-01-27T18:00:31","slug":"announcing-the-general-availability-of-azure-defender-for-iot","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/","title":{"rendered":"Announcing the general availability of Azure Defender for IoT"},"content":{"rendered":"<p>As businesses increasingly rely on connected devices to optimize their operations, the number of IoT and Operational Technology (OT) endpoints is growing dramatically\u2014industry analysts have estimated that CISOs will soon be responsible for an attack surface multiple times larger than just a few years ago.<\/p>\n<p>Today we are announcing that Azure Defender for IoT is now <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-defender-for-iot\/\" target=\"_blank\" rel=\"noopener noreferrer\">generally available<\/a>.<\/p>\n<p>Defender for IoT adds a critical layer of security for this expanding endpoint ecosystem. In contrast to user devices (laptops and phones) and server infrastructure, many IoT and OT devices do not support the installation of agents and are currently unmanaged and therefore invisible to IT and security teams. Without this visibility, it is extremely challenging to detect if your IoT and OT infrastructure has been compromised. Further increasing risk, many of these devices were not designed with security in mind and lack modern controls such as strong credentials and automated patching.<\/p>\n<p>As a result, there is understandable concern about <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-09-01-gartner-predicts-75--of-ceos-will-be-personally-liabl\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber-Physical System (CPS)<\/a> risk in OT and industrial control system (ICS) environments such as electricity, water, transportation, data centers, smart buildings, food, pharmaceuticals, chemicals, oil and gas, and other critical manufactured products. Compared to traditional IT risk, the business risk associated with IoT and OT is distinct and significant:<\/p>\n<ul>\n<li>Production downtime, resulting in <strong>revenue impact and critical shortages.<\/strong><\/li>\n<li>Theft of proprietary formulas and other sensitive intellectual property, causing <strong>loss of competitive advantage.<\/strong><\/li>\n<li>Safety and environmental incidents, leading to <strong>brand impact and corporate liability.<\/strong><\/li>\n<\/ul>\n<p>Traditional security tools developed for IT networks are unable to address these risks as they lack awareness of specialized industrial protocols such as Modbus, DNP3, and BACnet and this different class of equipment from manufacturers like Rockwell Automation, Schneider Electric, Emerson, Siemens, and Yokogawa.<\/p>\n<h2>Proactive IoT and OT security monitoring and risk visibility<\/h2>\n<p>With Defender for IoT, industrial and critical infrastructure organizations can now proactively and continuously detect, investigate, and hunt for threats in their IoT and OT environments. Incorporating specialized IoT and OT aware behavioral analytics and threat intelligence from our recent <a href=\"https:\/\/blogs.microsoft.com\/blog\/2020\/06\/22\/microsoft-acquires-cyberx-to-accelerate-and-secure-customers-iot-deployments\/\" target=\"_blank\" rel=\"noopener noreferrer\">acquisition of CyberX<\/a>, Azure Defender for IoT is an agentless security solution for:<\/p>\n<ul>\n<li>Auto-discovery of IoT and OT assets.<\/li>\n<li>Identification of vulnerabilities and prioritizing mitigations.<\/li>\n<li>Continuously monitoring for IoT and OT threats, anomalies, and unauthorized devices.<\/li>\n<li>Delivering unified IT and OT security monitoring and governance. This is achieved via deep integration with Azure Sentinel, Microsoft\u2019s cloud-native SIEM and SOAR platform, for sharing rich contextual information about IoT and OT assets and threats related to incidents. Support is also provided for other SOC workflows and security stacks including Splunk, IBM QRadar, and ServiceNow.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92651 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture1.png\" alt=\"Azure Defender for IoT provides comprehensive IoT and OT security including asset discovery, vulnerability management, and continuous threat detection, combined with deep Azure Sentinel integration\" width=\"999\" height=\"599\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture1.png 999w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture1-300x180.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture1-768x460.png 768w\" sizes=\"auto, (max-width: 999px) 100vw, 999px\"><\/p>\n<p><em>Azure Defender for IoT provides comprehensive IoT and OT security including asset discovery, vulnerability management, and continuous threat detection, combined with deep Azure Sentinel integration.<\/em><\/p>\n<h2>Fast and flexible deployment options<\/h2>\n<p>Defender for IoT is agentless, has deeply embedded knowledge of diverse industrial protocols, and makes extensive use of machine learning and automation, eliminating the need to manually configure any rules or signatures or have any prior knowledge of the environment.<\/p>\n<p>This means that Defender for IoT can typically be rapidly deployed (often in less than a day), making it an ideal solution for organizations with tight deadlines and short plant maintenance windows. Plus, it uses passive, non-invasive monitoring via an on-premises edge sensor which analyzes a copy of the network traffic from a SPAN port or TAP\u2014so there\u2019s zero impact on IoT and OT network performance or reliability.<\/p>\n<p>To provide customers flexibility and choice, Defender for IoT offers multiple deployment options:<\/p>\n<ul>\n<li><strong>On-premises<\/strong> for highly regulated or sensitive environments.<\/li>\n<li><strong>Azure-connected<\/strong> for organizations looking to benefit from the scalability, simplicity, and continuous threat intelligence updates of a cloud-based service, plus integration with the Azure Defender XDR.<\/li>\n<li><strong>Hybrid<\/strong> where security monitoring is performed on-premises but selected alerts are forwarded to a cloud-based SIEM like Azure Sentinel.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92652\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture2.png\" alt=\"Onboarding the network sensor to connect to Azure Sentinel via Azure IoT Hub \" width=\"2104\" height=\"1736\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture2.png 2104w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture2-300x248.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture2-1024x845.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture2-768x634.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture2-1536x1267.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/Picture2-2048x1690.png 2048w\" sizes=\"auto, (max-width: 2104px) 100vw, 2104px\"><\/p>\n<p><em>Onboarding the network sensor to connect to Azure Sentinel via Azure IoT Hub (optional).&nbsp;<\/em><\/p>\n<h2>Proven in some of the world\u2019s most complex and diverse environments<\/h2>\n<p>The technology delivered with Defender for IoT has been deployed in some of the world\u2019s largest and most complex environments, including:<\/p>\n<ul>\n<li>Three of the top 10 U.S. energy utilities, plus energy utilities in Canada, EMEA, and APAC.<\/li>\n<li>Three of the top 10 global pharmaceutical companies.<\/li>\n<li>Global 2000 firms in manufacturing, chemicals, oil and gas, and life sciences.<\/li>\n<li>One of the world\u2019s largest regional water utilities.<\/li>\n<li>Building management systems (BMS) for data centers and smart buildings worldwide, including in Microsoft\u2019s own Azure data centers.<\/li>\n<li>Multiple government agencies.<\/li>\n<\/ul>\n<h2>Getting started with Azure Defender for IoT<\/h2>\n<p>You can try Defender for IoT for free for the first 30 days and for up to 1,000 devices. After that, you pay on a per-device basis in increments of a thousand devices. Visit the <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-defender-for-iot\/\" target=\"_blank\" rel=\"noopener noreferrer\">product page<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/defender-for-iot\/getting-started\" target=\"_blank\" rel=\"noopener noreferrer\">getting started<\/a> pages to learn more.<\/p>\n<p>For more detailed product information:<\/p>\n<ul>\n<li>Read our blog post describing the product architecture and capabilities in more detail, titled \u201c<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/11\/25\/go-inside-the-new-azure-defender-for-iot-including-cyberx\/\" target=\"_blank\" rel=\"noopener noreferrer\">Go inside the new Azure Defender for IoT<\/a>.\u201d<\/li>\n<li>Watch our <a href=\"https:\/\/myignite.microsoft.com\/sessions\/973175b0-2a2d-4b41-99f8-051e42ac575a\" target=\"_blank\" rel=\"noopener noreferrer\">30-minute Ignite session with a demo showing<\/a> how integration with Azure Sentinel and IoT and OT-specific SOAR playbooks enable faster detection and response to multistage attacks that cross IT and OT boundaries, using the TRITON attack on a petrochemical facility as an example.<\/li>\n<li>If you\u2019re currently using Azure Defender for IoT, read our article about updating it with the latest <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/iot-security\/latest-threat-intelligence-15-december-2020-fireeye-and\/m-p\/1999394\" target=\"_blank\" rel=\"noopener noreferrer\">threat intelligence package<\/a> for detecting threats related to the compromise of the SolarWinds Orion product and theft of FireEye\u2019s Red Team tools.<\/li>\n<\/ul>\n<p>To learn more about Microsoft Security solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our&nbsp;website<\/a>. Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/27\/announcing-the-general-availability-of-azure-defender-for-iot\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As businesses increasingly rely on connected devices to optimize their operations, the number of IoT and Operational Technology (OT) endpoints is growing dramatically\u2014industry analysts have estimated that CISOs will soon be responsible for an attack surface multiple times larger than just a few years ago. Today we are announcing that Azure Defender for IoT is&#8230;<br \/>\nThe post Announcing the general availability of Azure Defender for IoT appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39321,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6426,347,77,236],"class_list":["post-39320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-security","tag-cybersecurity","tag-iot","tag-iot-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Announcing the general availability of Azure Defender for IoT 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Announcing the general availability of Azure Defender for IoT 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-27T18:00:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png\" \/>\n\t<meta property=\"og:image:width\" content=\"999\" \/>\n\t<meta property=\"og:image:height\" content=\"599\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Announcing the general availability of Azure Defender for IoT\",\"datePublished\":\"2021-01-27T18:00:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/\"},\"wordCount\":962,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png\",\"keywords\":[\"Azure Security\",\"Cybersecurity\",\"IoT\",\"IoT security\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/\",\"name\":\"Announcing the general availability of Azure Defender for IoT 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png\",\"datePublished\":\"2021-01-27T18:00:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png\",\"width\":999,\"height\":599},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Security\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/azure-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Announcing the general availability of Azure Defender for IoT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Announcing the general availability of Azure Defender for IoT 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/","og_locale":"en_US","og_type":"article","og_title":"Announcing the general availability of Azure Defender for IoT 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-27T18:00:31+00:00","og_image":[{"width":999,"height":599,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Announcing the general availability of Azure Defender for IoT","datePublished":"2021-01-27T18:00:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/"},"wordCount":962,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png","keywords":["Azure Security","Cybersecurity","IoT","IoT security"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/","url":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/","name":"Announcing the general availability of Azure Defender for IoT 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png","datePublished":"2021-01-27T18:00:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/announcing-the-general-availability-of-azure-defender-for-iot.png","width":999,"height":599},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/announcing-the-general-availability-of-azure-defender-for-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-security\/"},{"@type":"ListItem","position":3,"name":"Announcing the general availability of Azure Defender for IoT"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39320"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39320\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39321"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}