BYOD & Mobile Security

BYOD and Mobile Security

BYOD - Secure Mobile Devices According to data from Aberdeen, 75 percent of companies allow employee-owned smartphones and/or tablets to be used at work.1 Meanwhile, Gartner predicted that this number would rise to 90 percent by 2014.2 The bring-your-own-device (BYOD) movement has significant productivity, convenience and cost benefits, but it is leading to serious challenges for IT administrators.

Unfortunately, mobile users often circumvent corporate security policies and safeguards, and it is too cumbersome – and often impossible – to install and manage security software on every new device.

Lancope’s StealthWatch® System solves this problem by delivering in-depth internal security monitoring that proactively detects issues stemming from any device on the network, without having to install additional software on the device or deploy expensive probes.

StealthWatch can detect and alarm on anomalous behavior originating from users’ personal smartphones, tablets or laptops, enabling organizations to quickly and easily uncover both externally-launched, zero-day attacks, and internal threats such as network misuse, policy violations, data leakage and device misconfigurations – regardless of the device being used.

Traditional threat detection mechanisms such as probe devices, antivirus and IDS/IPS quickly become cost prohibitive, ineffective and unfeasible within a BYOD environment. Unlike these technologies, StealthWatch provides a complete picture of everything happening on the network to deliver the situational awareness needed to maintain high levels of security and performance amidst a constantly-evolving network and mobile environment.

For more information, see the Market Brief - StealthWatch for Mobile Device Security.

1 – http://www.zdnet.com/blog/sybase/75-of-enterprises-have-bring-your-own-device-policies-what-that-means-charts/1025

2 – http://www.gartner.com/it/page.jsp?id=1480514