Shining a Light on Shadow Devices
-
Upload
forescout-technologies-inc -
Category
Technology
-
view
584 -
download
2
Transcript of Shining a Light on Shadow Devices
Mobile Devices can connect directly to thecellular data network for a path around your security controls.
SHADOW DEVICES:
Smart Phones & Tablets
Allowing BYOB (bring your own device) can be cheaper but balancing protection of corporate data against antagonizing employees has been challenging.
SHADOW DEVICES:
Employee Devices
SHADOW DEVICES:
Printers & Scanners
Office Devices can become targets, providing attackers with beachheads on your networks.
SHADOW DEVICES:
Connected Security Devices
Attackers grant themselves access via a security device using the default password with physical security devices.
It could be a sensor collecting information from factory robots or a warehouse system, but many of these devices are networked too — so they can be attacked.
SHADOW DEVICES:
Control Systems &Equipment
SHADOW DEVICES:
Thermostats,Security & Automation
Connected home items have a network connection and access to the Intertubes, so it can be attacked.
SHADOW DEVICES:
Remote ControlledAutomobiles
Moving automobiles, which can use a smart phone connection or its own internet, can be attacked and controlled remotely.