Denial has proven futile. Once just a worrisome trend, shadow IT has grown into a monster. The aptly named phenomenon, a known risk of data breaches and financial liabilities, pits information technology professionals against end users in an endless battle for control of the digital workplace environment.
The “number of unauthorized cloud apps being used in the enterprise” is up to 20 times higher than CIOs predicted, according to a Cisco survey. Attempts to suppress the infiltration of user apps with strict controls have done little more than exacerbate the face-off between “stodgy” IT departments and freedom-loving end users.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access