IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

2020 report: The threat posed by shadow IoT devices

Unsanctioned IoT devices open a portal for chaos across the network

whitepaper

Although awareness of the risk of shadow IoT devices has grown, the complexities of managing these unsanctioned IT operations are still a significant stressor for many organisations. From company devices to mobile phones, fitness trackers and personal laptops, more than half of organisations report having 2,000-10,000 devices on their own corporate networks.

These devices pose various levels of risk to organisations and their networks. This report brings together extensive insights from 2,600+ IT professionals from around the world to investigate the extent to which shadow IoT devices pose a security risk to networks. It also provides practical recommendations on how companies can best manage the threat posed by shadow IoT devices.

Download it now to learn why IoT devices are a threat, how to manage the new network perimeter as you scale, and what to prioritise to effectively defend your networks.

Most Popular

Tech pioneers call for six-month pause of "out-of-control" AI development
artificial intelligence (AI)

Tech pioneers call for six-month pause of "out-of-control" AI development

29 Mar 2023
Getting the best value from your remote support software
Advertisement Feature

Getting the best value from your remote support software

13 Mar 2023
3CX CEO confirms supply chain malware attack
malware

3CX CEO confirms supply chain malware attack

30 Mar 2023
What the UK can learn from the rest of the world when it comes to the shift to IP
Sponsored

What the UK can learn from the rest of the world when it comes to the shift to IP

20 Mar 2023