![]() ![]() Employees are balking at the idea of using company-issued technology, preferring to use their own devices for work. “If a company is only scanning for these devices monthly, they do not have an accurate picture of their network weakness.”īYOD has been on the rise since the first Apple iPhone was introduced in 2007, and gained steam when the iPad tablet hit the market in 2010. “As innovations such as BYOD and virtualization gain traction within the organization, more and more transient devices are being brought into the organization and onto corporate networks,” Gula said in a statement. Such trends are forcing businesses to increase the amount of scanning they do of their networks, according to Tenable CEO Ron Gula. The bring-your-own-device (BYOD) trend, with employees tapping into the network with their own computing devices, promises greater productivity and lower operating and capital costs for businesses, but also creates more management and security headaches for IT staff. The move comes at a time when corporate networks are increasingly seeing more applications crossing the infrastructure and more devices-from notebooks to smartphones to tablets-connecting to the network. Company officials made the announcement July 30 at the Black Hat 2013 security conference. ![]() Tenable at the end of the month will make its Passive Vulnerability Scanner (PVS), which until now had been available to customers using Tenable’s Securit圜enter and Securit圜enter Continuous View offerings, available to any business. Tenable Network Security is releasing a stand-alone version of its real-time networking monitoring technology to help organizations deal with the security concerns arising from such trends as bring-your-own-device and virtualization. We may make money when you click on links to our partners. EWEEK content and product recommendations are editorially independent. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |