From a device management standpoint, many enterprises
are not equipped to extend existing security management
mechanisms to these devices. Issues like conducting
inventory, monitoring device access and architectural
placement of the device on the network and other
challenges must be considered, in the same way that they
are considered for traditional IT components.