2020 report: The threat posed by shadow IoT devices
Unsanctioned IoT devices open a portal for chaos across the network
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Although awareness of the risk of shadow IoT devices has grown, the complexities of managing these unsanctioned IT operations are still a significant stressor for many organisations. From company devices to mobile phones, fitness trackers and personal laptops, more than half of organisations report having 2,000-10,000 devices on their own corporate networks.
These devices pose various levels of risk to organisations and their networks. This report brings together extensive insights from 2,600+ IT professionals from around the world to investigate the extent to which shadow IoT devices pose a security risk to networks. It also provides practical recommendations on how companies can best manage the threat posed by shadow IoT devices.
Download it now to learn why IoT devices are a threat, how to manage the new network perimeter as you scale, and what to prioritise to effectively defend your networks.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
AWS CEO Matt Garman isn’t convinced AI spells the end of the software industryNews Software stocks have taken a beating in recent weeks, but AWS CEO Matt Garman has joined Nvidia's Jensen Huang and Databricks CEO Ali Ghodsi in pouring cold water on the AI-fueled hysteria.
-
Deepfake business risks are growingIn-depth As the risk of being targeted by deepfakes increases, what should businesses be looking out for?
-
Russian hackers are using an old Cisco flaw to target network devices – here’s how you can stay safeNews With the aim of carrying out espionage, Russia's Center 16 is targeting infrastructure organizations around the world
-
HPE eyes enterprise data sovereignty gains with Aruba Networking Central expansionNews HPE has announced a sweeping expansion of its Aruba Networking Central platform, offering users a raft of new features focused on driving security and data sovereignty.
-
Fortify your future: How HPE ProLiant Servers deliver top-tier cyber security, management, and performanceWhitepaper Deploy servers with a secure approach
-
Fortify your future with HPE ProLiant Servers powered by IntelWhitepaper Enhance your security and manage your servers more effectively
-
Architecting enterprise networks for the next decadeWhitepaper A new paradigm in network architecture
-
Why network monitoring tools fail within secure environmentsWhitepaper Gain visibility into devices, networks, and applications
-
Better together: HPE Aruba Networking CX switches and HPE Aruba Networking CentralWhitepaper Explore the power and simplicity of managing HPE Aruba Networking CX Switches with HPE Aruba Networking Central
-
Cyber-resilient infrastructure starts with server securitywhitepaper Take a security-focused approach when investing in the next wave of IT infrastructure.
