Story image

Struggling with IoT or BYOD? Here’s how to overcome the main challenges

19 Jan 18

​The ideas of ‘bring your own device’ (BYOD) and Internet of Things (IoT) are a dream come true for most employees – but a nightmare for IT staff.

According to Aruba, 76 percent of businesses remain unprotected from insider threats. Meanwhile, the exponential growth of IoT, corporate and BYOD devices has further reduced visibility, yet security resources have not been increased accordingly.

Research from Gartner reveals that each employee uses an average of three mobile devices. When you factor in corporate guests, contractors and temporary employees (among others), the number of wired and wireless devices connecting to the network grows even higher.

The whole idea of being agile and able to connect anywhere and anytime has been embraced by many businesses, while the need for secure network access control (NAC) has been largely ignored.

This leaves extensive security gaps within networks and can leave them prone to crippling attacks. However, Aruba says this doesn’t’ mean businesses should sacrifice the many benefits that come with a modern and agile network.

Currently 7,000 enterprise customers around the world use Aruba ClearPass to ensure a more secure and productive environment

Something IT staff will certainly appreciate, IDC has calculated time savings of 283 hours per 1,000 devices per year across network security, incident management, device onboarding and network guest management – translating to $12,036 in IT staff time.

Survey reveals CX disconnect is risky business
Too much conversation and too little action could lead companies to neglect, lose, and repel their very lifeblood, according to Dimension Data.
Should AI technology determine the necessity for cyber attack responses?
Fujitsu has developed an AI that supposedly automatically determines whether action needs to be taken in response to a cyber attack.
Police making progress into Cryptopia breach
New Zealand Police say they are making ‘good progress’ into the investigation of an alleged cryptocurrency theft from Christchurch-based crypto exchange Cryptopia.
NEC concludes wireless transport SDN proof of concept
"Operation and management of 5G networks are very complicated and require automation and closed-loop control with timely data refinement and quick action."
Trend Micro’s telecom security solution certified as VMware-ready
Certification by VMware allows communications service providers who prefer or have already adopted VMware vCloud NFV to add network security services from Trend Micro.
Top cybersecurity threats of 2019 – Carbon Black
Carbon Black chief cybersecurity officer Tom Kellermann combines his thoughts with those of Carbon Black's threat analysts and security strategists.
Avaya introduces private cloud delivery of its UCaaS solution
Avaya is supposedly taking a flexible hybrid approach to the cloud with these new solutions.
Data growth the growing case for managed colocation
The relentless growth of data could see colocation take on a new importance, says Jon Lucas.