Would you notice a man in a gorilla suit walking past you on the street?\nWhile you may think, \u201cOf course!\u201d the real answer is probably not.\nHere\u2019s the proof: In 1999 Professors Christopher Chabris and Daniel Simons, who study human cognitive abilities, conducted an experiment where subjects watched a video of six people passing basketballs and were told to count the number of times the people wearing white passed the ball. Simple enough, right? However, about half of watchers missed a person in a gorilla suit walking in and out of the scene thumping its chest. This test has been replicated many times with similar results. Several years later Simons repeated the experiment with a twist. This time he showed the video to people who already knew about the first test and its \u201cinvisible gorilla.\u201d While all of them saw the ape, only 17% saw the new events that had been added to the video.\nThe fact is, most people only see what they expect to see.\nWhat does this have to do with managing your network?\nYou can only manage what you know is on your network. That\u2019s not news to you because you have to regularly check to see what is on it. Unfortunately the programs you\u2019re using have critical flaws which prevent them from seeing the entire network.\n\nThere\u2019s Program A, which will tell you everything on the network as long as it\u2019s in LDAP or an active directory.\nThen there\u2019s Program B, which uses up so much of your network that you can only run it at night or on the weekends.\n\nBoth of these will only see what you expect them to see.\nProgram A won\u2019t find intentionally malicious devices because no hacker who can be considered a real threat is going to list the device he or she is using in an active directory. What may be worse is that this program also leaves the network open to attack via devices that are left out of LDAP simply because someone forgot to add it to the list.\nOf course, Program B can only check the network at times when most people aren\u2019t working and so their devices aren\u2019t on the network. That\u2019s not terribly useful, is it?\nIBM Endpoint Manager will show you the network as it really is\u2014the devices you\u2019re already managing and the ones you weren\u2019t because you didn\u2019t know were there. Its asset discovery and inventory features create dynamic situational awareness about changing conditions in the infrastructure. You can run distributed scans on the entire network to identify all IP-addressable devices, including that wireless access point you thought was disabled.\nBecause it places a thin, intelligent agent on every device that connects to the network, it doesn\u2019t hog the network and can run continuously. Endpoints that are off network but connected to the internet are still secured and compliant in real-time through cloud based protection. Let\u2019s say someone takes home a laptop over the weekend and unintentionally installs some malicious software when there is no internet connectivity. As soon as that laptop is back on the network IBM Endpoint Manager knows what is on it and whether or not it\u2019s in compliance and automatically quarantines the endpoint until it is remediated. It delivers near real time and continuous reporting and analysis from those agents to you on a single console. IBM Endpoint Manager is highly scalable, securely managing up to 250,000 endpoints per management server, regardless of endpoint type or location. With that visibility, you'll never miss the gorilla again\u2014wherever he is. So it\u2019s like having a quarter-million more staff whose only job is manage your network.\nClick here to find out more, before that guy in the gorilla suit sneaks up on you.