ATLANTA, May 7, 2012 /PRNewswire/ -- Interop Las Vegas – Lancope, Inc., a leader in flow-based security and network performance monitoring, will join a panel discussion at Interop Las Vegas to share best practices for securing and maintaining high performance levels for bring-your-own-device (BYOD) environments. The panel, "Living With (And Prospering From) BYOD," will be moderated by Tim Scannell, an editorial director for TechTarget, and will feature three panelists including Lancope Network Security Manager Chris Smithee. More details on the session, taking place at Mandalay Bay on Thursday, May 10 at 11:30 a.m. PDT, can be found at: http://www.interop.com/lasvegas/conference/wireless-and-mobility.php.
"As smartphones and tablets become ubiquitous among today's professionals, more and more enterprise organizations are allowing employees to bring these devices, as well as their personal computers, to the office," said Smithee of Lancope. "Unfortunately, if they are not properly managed and secured, the influx of personal devices onto corporate networks can lead to dire consequences when it comes to security and performance."
With mobile devices expected to exceed PCs in both shipments and spending this year, BYOD is here to stay. Smithee and the other panelists will educate attendees on the various risks involved with the rapidly-emerging trend, and how to mitigate these risks to take advantage of benefits including cost savings and greater user productivity.BYOD is quickly rendering traditional network defense mechanisms such as antivirus, firewalls and IDS/IPS ineffective, and it is often unfeasible or even impossible to install additional security software on every new device that enters the network. By leveraging next-generation solutions like Lancope's StealthWatch® System, organizations can effectively protect the network from risks introduced via personal smartphones, tablets or laptops without the need to install software on users' devices. StealthWatch conducts sophisticated behavioral analysis of NetFlow, IPFIX and other flow data inherent in existing infrastructure to provide cost-effective, end-to-end network visibility and protection. The rapid expansion of flow data across today's infrastructure makes it so that inspection points for various devices can be as close as the switch to which they are connected.