Rapid adoption of BYOD has led to an explosion of personally owned mobile devices connecting to an organization’s network, and has expanded the attack surface for possible cyber threats. This challenge is exacerbated by the growth of additional Internet of Things (IoT) devices connecting to the enterprise networks.
Although improvements in threat detection have been made, containment (time from detection to remediation) still requires human intervention, resulting in higher costs and longer timeframes to respond. Once a threat is detected and attributed to a specific device and owner, the most important step is to contain the device in real-time without requiring a software agent on the device. It’s equally important to have containment options that are appropriate for a breach, as some may be malicious and others may be inadvertent.