Background
Device security threat report

Do You Really Know Every Device on Your Network?

Every connection, every endpoint, every overlooked system matters. Discover what our analysis of 27M+ devices reveals about today’s enterprise risks — highlighting blind spots, vulnerabilities, and urgent threats you need to know.
Scroll to discover
THE DEVICE LANDSCAPE

Know your device landscape — every asset, every vulnerability, every connection.

We studied more than 27 million devices for this analysis. Adversaries thrive on gaps in knowledge:
Blind spots in asset inventories
Unknown risks
Deprecated protocols
Unmanaged applications
Overlooked dependencies
Scroll to see gaps
ENDPOINT COVERAGE GAPS

There are significant gaps in endpoint coverage.

Coverage gaps leave enterprises exposed, creating opportunities for adversaries to exploit weaknesses in security posture and magnify risk across the entire network.
0
%
Nearly 39% of IT devices registered in Active Directory lack an active endpoint agent.
0
%
33%  of devices in corporate networks are unmanaged, which expands the attack surface
Scroll for vulnerabilities
DEVICE VULNERABILITIES

Some device types are more exposed than others.

Before diving into the rankings, it’s important to note that devices differ not just in function but also in how exposed they are to attackers. Systems that are always-on, widely connected, or critical to business operations can become high‑value targets.

The most vulnerable device types include, in order: video conferencing and video streaming devices, network equipment, PCs, and IT servers.

Consumer Electronics

IT Servers

Network Equipment

Network Security Equipment

Personal Computers

Smart TV

Smartphones or Tablets

Video Conference and Video Streaming

Virtual Machines

Wearables

Scroll for EOL systems
END-OF-LIFE SOFTWARE

Outdated systems = persistent risk.

End-of-Life (EOL) software presents a persistent risk on devices.  26% of Linux systems and 8% of Windows systems are running on EOL versions of operating systems.
0
%
Linux Systems
0
%
Windows Systems
Scroll for IOT risks
IOT RISKS

High-risk devices fuel high-risk traffic.

48.2% of all network connections come from high-risk IoT devices.
0
Network Connections
Approximately 21% of IoT devices have at least one known vulnerability, introducing systemic risk into enterprise networks.
0
IoT Devices
Scroll for key takeaways
KEY TAKEAWAYS

From exposure to action.

To move from understanding the risks to actively mitigating them, organizations need a clear set of priorities. The following pillars summarize the essential actions every enterprise should consider.
Proactive Security Essential
Threats evolve, requiring a proactive security program.
Deep Visibility is Key
Go beyond device counts to understand attributes, vulnerabilities, and interactions.
Blind spots in asset inventories
Connect exposures to adversary behavior and disrupt entire attack paths.
Contextualized Action
Know what assets do, how they're connected, their vulnerabilities, and business importance.
Ecosystem Management Vital for Proactive Stance
Every element in the network can impact overall security; to be proactive you must understand the dynamics of all elements in the landscape.
Scroll to next steps
next step

Eager to dive into the details?

Report Cover
There is a lot more about device security risks and the ways in which they can be secured in the 2025 Device Security Threat Report. Get your copy today.