IOT, BYOD, And SHADOW IT
What's Hiding In Your Network?
Internet-connected devices are popular and useful, but many are poorly secured with easily crackable passwords. Users may connect their own devices to the network, unaware that these same devices are infected with malware. These devices may not even be visible to many commonly-used security tools. Once these insecure devices are connected to the network, they can become potent weapons for attackers.
MENDEL, from GREYCORTEX helps detect threats to the network from IoT, BYOD, and Shadow IT devices, and to the devices themselves.
・IOT devices create network traffic just like more traditional
    network components
・Traffic - and threats - are easily detectible by MENDEL
・MENDEL works where endpoint security can't be installed
・MENDEL visualizes Shadow IT just like approved network
    devices

For many reasons, employees often deploy “Shadow-IT” – or unauthorized devices or technology in the network. This can include anything from employees’ personal phones, to wi-fi routers or other hardware. This presents a serious IT security risk. But finding these devices can be impossible without effective network visibility. MENDEL provides the same deep visibility into these devices that it does for “approved” devices, allowing IT administrators to get control of Shadow IT within their networks, and make them more secure. MENDEL can even provide a report of new/unauthorized devices on the network; saving hassle for management investigations.

MENDEL is able to use network traffic analysis to detect threats to IoT devices in the network in the same way it detects threats to more common network devices like laptops, routers, printers etc. Because IoT devices are connected to the network, MENDEL can identify their network traffic as they communicate with other devices in the network. Their normal traffic is learned by the same machine learning model used in MENDEL's network traffic analysis. Threats from compromised IoT devices can be identified quickly by their actions without the need to install endpoint clients or review logs, etc. MENDEL helps secure the network, no matter the device.
・IOT devices create network
    traffic just like more traditional
    network components
・Traffic - and threats - are easily
    detectible by MENDEL
・MENDEL works where
    endpoint security can't be
    installed
・MENDEL visualizes Shadow IT
    just like approved network
    devices

For many reasons, employees often deploy “Shadow-IT” – or unauthorized devices or technology in the network. This can include anything from employees’ personal phones, to wi-fi routers or other hardware. This presents a serious IT security risk. But finding these devices can be impossible without effective network visibility. MENDEL provides the same deep visibility into these devices that it does for “approved” devices, allowing IT administrators to get control of Shadow IT within their networks, and make them more secure. MENDEL can even provide a report of new/unauthorized devices on the network; saving hassle for management investigations.

MENDEL is able to use network traffic analysis to detect threats to IoT devices in the network in the same way it detects threats to more common network devices like laptops, routers, printers etc. Because IoT devices are connected to the network, MENDEL can identify their network traffic as they communicate with other devices in the network. Their normal traffic is learned by the same machine learning model used in MENDEL's network traffic analysis. Threats from compromised IoT devices can be identified quickly by their actions without the need to install endpoint clients or review logs, etc. MENDEL helps secure the network, no matter the device.
・IOT devices create network
    traffic just like more traditional
    network components
・Traffic - and threats - are easily
    detectible by MENDEL
・MENDEL works where
    endpoint security can't be
    installed
・MENDEL visualizes Shadow IT
    just like approved network
    devices

For many reasons, employees often deploy “Shadow-IT” – or unauthorized devices or technology in the network. This can include anything from employees’ personal phones, to wi-fi routers or other hardware. This presents a serious IT security risk. But finding these devices can be impossible without effective network visibility. MENDEL provides the same deep visibility into these devices that it does for “approved” devices, allowing IT administrators to get control of Shadow IT within their networks, and make them more secure. MENDEL can even provide a report of new/unauthorized devices on the network; saving hassle for management investigations.

MENDEL is able to use network traffic analysis to detect threats to IoT devices in the network in the same way it detects threats to more common network devices like laptops, routers, printers etc. Because IoT devices are connected to the network, MENDEL can identify their network traffic as they communicate with other devices in the network. Their normal traffic is learned by the same machine learning model used in MENDEL's network traffic analysis. Threats from compromised IoT devices can be identified quickly by their actions without the need to install endpoint clients or review logs, etc. MENDEL helps secure the network, no matter the device.

Do you have any question?
Please leave us your contact details so we can deliver a personalized offer tailored to your company’s needs.