Programs that network users download and install on their computers usually without permission from or knowledge of the IT department. While some greynet applications are often useful (for example, instant messaging, streaming media and RSS software, peer-to-peer file sharing, peer-to-peer collaboration and proxy applications), they can also include or malicious programs (such as spyware).
Featured Partners Sponsored
- Increase worker productivity, enhance data security, and enjoy greater energy savings. Find out how. Download the “Ultimate Desktop Simplicity Kit” now.»
- Find out which 10 hardware additions will help you maintain excellent service and outstanding security for you and your customers. »
- Server virtualization is growing in popularity, but the technology for securing it lags. To protect your virtual network.»
- Before you implement a private cloud, find out what you need to know about automated delivery, virtual sprawl, and more. »