INFOGRAPHIC
Shadow IoT devices a major
concern for corporate networks,
Infoblox research finds
IT’s knowledge. Shadow IoT devices can
be any number of connected technologies
including laptops, mobile phones, tablets,
fitness trackers or smart home gadgets
like voice assistants that are managed
outside of the IT department.
The survey found that over the past
12 months, a staggering 80% of IT
professionals discovered shadow IoT
devices connected to their network and
nearly one third (29%) found more than 20.
The global report revealed that, in
addition to the devices deployed by the
IT team, organisations around the world
have countless personal devices, such
as personal laptops, mobile phones and
fitness trackers, connecting to their
network. The majority of enterprises
(78%) have more than 1,000 devices
connected to their corporate networks.
Research from Infoblox,
a leader in secure cloud-
managed network services,
reveals the dangers
presented by IOT devices to
enterprise networks.
www.intelligentdatacentres.com
nfoblox has announced
research that exposes the
significant threat posed
by shadow IoT devices on
enterprise networks. The report, What’s
Lurking in the Shadows 2020, surveyed
2,650 IT professionals across the US, UK,
Germany, Spain, the Netherlands and UAE
to understand the state of shadow IoT in
modern enterprises. Shadow IT devices
are defined as IoT devices or sensors in
active use within an organisation without
I
“The amount of shadow IoT devices
lurking on networks has reached pandemic
proportions and IT leaders need to act
now before the security of their business
is seriously compromised,” said Malcolm
Murphy, Technical Director, EMEA at
Infoblox. “Personal IoT devices are easily
discoverable by cybercriminals, presenting
a weak entry point into the network
and posing a serious security risk to the
organisation. Without a full view of the
security policies of the devices connected
to their network, IT teams are fighting a
losing battle to keep the ever-expanding
network perimeter safe.”
“As workforces evolve to include
more remote and branch offices and
enterprises continue to go through Digital
Transformations, organisations need to
focus on protecting their cloud-hosted
services the same way they do at their
main offices,” the report recommends.
“If not, enterprise IT teams will be left in
the dark and unable to have visibility over
what’s lurking on their networks.” ◊
Issue 14
25