PRO+ Premium Content/Modern Infrastructure

Thank you for joining!
Access your Pro+ Content below.
February 2017, Vol. 6, No. 2

Beyond shadow IT risks, opportunity awaits

Increasingly, corporate end users circumvent IT to deploy and maintain their own cloud-based software and services. The trend, termed shadow IT, is the result of a technologically savvy workforce unwilling to settle for sub-par application performance, device incompatibility or inadequate application features. For IT departments, the challenge is to better understand the draw of shadow IT and how best to provide tools that satisfy workers' appetite for productivity and performance. In the process, it will also mean jettisoning some traditional IT approaches. Shadow IT risks in the enterprise It's generally accepted that shadow IT is widespread across corporate environments and poses a number of hidden costs. According to Gartner, by 2020, one third of successful cyberattacks experienced by enterprises will be on their shadow IT resources. IT teams are at a distinct disadvantage when it comes to securing unsanctioned cloud services. For example, without clear IT oversight of service-level agreements, business data stored outside ...

Features in this issue

Columns in this issue

SearchServerVirtualization

SearchVMware

SearchVirtualDesktop

SearchAWS

SearchDataCenter

SearchWindowsServer

SearchCRM

-ADS BY GOOGLE

Close