PRO+ Premium Content/Network Evolution

Thank you for joining!
Access your Pro+ Content below.
May 2017, Vol. 8, No. 4

Enlightened shadow IT policy collaborates with users

Most IT departments have spent time rooting out the shadow, or non-IT-sanctioned, applications and systems in use within their organizations. Today, users find that cloud-based services not necessarily approved by IT enable them to quickly subscribe to applications and platforms that improve their collaboration and productivity. That advantage is prompting IT organizations to rethink how to work with users rather than have a shadow IT policy that is in full-out combat against apps that haven't been fully blessed by the enterprise and could introduce security risks. Shadow IT, also called stealth IT, didn't begin with the advent of cloud services. Long before cloud services existed, users were creative about applications that hadn't been deployed by IT. On-premises stealth IT options included VoIP software, online messaging software, portable data storage devices and content apps, to name only a few. "We used to have to worry about people buying a server and installing it in the closet, now shadow IT is mostly around cloud ...

Features in this issue

Columns in this issue

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

-ADS BY GOOGLE

Close