dcsimg

Six Reasons Why CES Should Scare the Hell out of Network Administrators

Email     |    
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Reasons Why CES Should Scare the Hell out of Network Administrators-6 Next

Fitbit Charge HR – Increased Vulnerabilities

Technology such as the new heart-rate monitoring version of Fitbit's fitness tracker is making the world smarter about fitness. But what does that mean for the health of your corporate network? More employee-controlled devices with the ability to connect to the network mean more points of vulnerability and bandwidth usage. While on their own, the impact is relatively small, the combined impact of these increasingly popular and affordable devices can create an impact on the enterprise. And as technology has proven over and over again, while it may start small, its impact only increases over time, creating numerous points of access and vulnerability.

Held in Las Vegas annually, the Consumer Electronics Show (CES) stands as a symbol of what is possible in technology. CES has served as the proving ground for innovators and breakthrough technologies for more than 40 years — a global stage where next-generation innovations are introduced to the marketplace. And 2015's show was no exception.

Networked homes, more capable wearable devices, wireless entertainment and even your own personal drones were at the head of the list for 2015. While the tech geek is busting at the seams with anticipation, the network administrator is scared to death. All of this technology results in bandwidth hoarding, security vulnerabilities and compliance concerns for IT departments.

In this slideshow, Ipswitch, a software and service provider, explores the technologies emerging from CES with the most potential to disrupt the business and network. If you're a network administrator, these six trends should have you concerned.

 

Related Topics : Blade Servers, Business Integration, Ethernet, LAN, Network Protocols

 
More Slideshows

IIoT IIoT Gaining Momentum in Adoption and Results

Cost reduction has been the main driver of IIoT adoption. Other contributors are the emergence of ancillary and complementary technologies, including low-power hardware devices, the cloud, Big Data analytics, robotics and automation and smart sensors. ...  More >>

InfoBuildersIoTData0x Capitalizing on IoT Data: The Golden Rule for Data Success

The key to truly capitalizing on IoT data is a well-established, integrated information management strategy. ...  More >>

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

×
By using this site, you agree to the Privacy Policy