Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

The BYOD Security Dilemma

The Information Security Forum this week released a report titled 'Threat Horizon 2014' that looks at the continued global threat to computer networks, businesses and individuals from cybercrime. But one section of the report also looks at 'Internal Threats', which at first glance would seem like another discussion about malicious insiders who attack the network because they’re disgruntled. In fact, the Internal Threats identified in this report are from new technology that comes into an organization, sometimes presenting security issues its advocates weren’t aware of. A case in point is BYOD.

BYOD is the situation where employees are allowed to 'bring your own device' to work and IT will allow it to access the corporate network, also known as Bring Your Own Disaster. But companies need to balance acceptance of consumer-built smartphones and tablets with control of those devices to protect their networks. “Organizations are unlikely to slow their adoption of new technology,” the report states, “[But] along with business benefits come potential vulnerabilities and methods for attack.”

The report looks at a variety of new technologies, including cloud computing, that can create new internal threats to an organization, but Steve Durbin, global vice president of the Information Security Forum (ISF) says BYOD is certainly one of them. The ISF is a UK-based, but worldwide, independent not-for-profit organization that shares research and other advice on security best practices for organizations.

“Consumer devices were never intended to be highly secure,” he says. Durbin cites the example of the Google Android applications marketplace, Android Market, as proof. Google had to add new security controls in February after reports that a high number of applications there turned out to be instruments for delivery of malware to the device.

“I described the Android apps market as Route 1 for any cybercriminal or hacker. That’s where you go,” Durbin says.

“Unless you’ve thought through your BYOD strategy, unless you’ve put in place some real good governance around it and you get your users to sign up to acceptable use policies, there’s very little you can do to enforce some of these things,” he adds.

The management consulting firm Janco Associates recently published a report suggesting a 'BYOD Policy Template' organizations should consider to welcome BYOD into the workplace but not at the expense of security.

Page:  1 | 2  | Next Page »

Related Reading

More Insights

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013

TechWeb Careers