- Mar 26 2015
About this product:
While tech-giddy employees are prone to fawn over every new iThing smuggled into the workplace—devices that are often used in violation of company policy—IT security pros see something very different: a security breach waiting to happen. The hard fact is that many of those unauthorized devices can slash gaping holes in company security systems in a nanosecond, exposing company data and applications to hackers. Indeed, even some authorized devices keep security IT up at night, since their current software solution may not be designed to handle some of the brand-new phones and tablets.