Greynets are network enabled applications that are installed on an end user's system without permission from IT and are frequently evasive at the network level, using techniques like port agility and encryption to avoid being detected and blocked.
Greynets pose a myriad of network and information security risks including potential vectors for malware, client-side code vulnerabilities, intellectual property loss, identity theft and more. While some greynets, especially IM, have legitimate business uses, others are not so business-friendly. Even legitimate greynet applications can pose grave network and information security risks.