Summary
In this chapter, we have touched upon some of the important features of MDIoT and seen how it can help address open challenges by addressing the asset inventory, risk and vulnerability management, and continuous threat monitoring. We have also learned how to install the MDIoT sensor and seen it populating the dashboard with data.
It is now time for us to understand what the data we have collected so far can do for us as an organization and how these threat insights can save the day. We will look at this in the next chapter by understanding asset inventory. Asset inventory is a critical part of the OT/IoT cybersecurity landscape, and we will delve deeper into it next.