Tag Archive for: Shadow IT

Network Security Management: Handling Employee Expectation

By Doug Bonderud

Employees now have big expectations when it comes to corporate networks. How do companies ensure network security management doesn't suffer as a result? Read More

By Doug Bonderud
Freelance Writer

February 22, 2017

2017 Mobility Trends Bring New Dangers, Opportunities to the Enterprise

By Jeff Bertolucci

The mobile workforce will continue to expand in 2017 as enterprises embrace mobility trends such as BYOD, BYOA, AR, VR and the IoT. Read More

By Jeff Bertolucci
News Writer

January 31, 2017

Telecommunications CIOs, How Mature Is Your IT Supply Chain?

By Paul Mears

Telecommunications enterprises swim in the most extreme IT supply chain, and the demand for instant IT services is higher than ever. Read More

By Paul Mears
Brokerage Services Sales, IBM

December 21, 2016

IT Pros Acknowledge Shadow IT Risks Within Their Organizations

By Jacqueline Lee

According to a recent SpiceWorks survey of 338 IT pros, 80 percent say end users have exposed organization to shadow IT risks. Read More

By Jacqueline Lee
Freelance Writer

October 18, 2016

Shedding Light on Shadow IT

By Josh Nelius

Many employees believe using their own apps is harmless, but shadow IT has raised security concerns. Shadow IT is costly and can compromises security. Read More

By Josh Nelius
Cloud Customer Analyst, IBM

August 12, 2016

Hybrid IT Can Leave You Blindsided

By Fran Howarth

Organizations today must deal with hybrid IT as more employees use their own devices and apps. A CASB can reduce any blind spots hybrid IT may create. Read More

By Fran Howarth
Freelance Writer

August 8, 2016

Understanding the Power of Policies for BYOD

By Daniel Newman

Shadow IT is a credible security threat. For a time, the bring your own device (BYOD) trend was seen as a major contributor to that threat. BYOD does not have… Read More

By Daniel Newman
Founder and President, Broadsuite, Inc.

June 17, 2016

How Shadow IT Should Shape Your Cloud Computing Strategy

By Brian Gracely

As public cloud computing has continued to grow in size and breadth of applications, often outside the control of IT organizations, the amplitude of frustration… Read More

By Brian Gracely
Founder of Cloudcast Media and co-host of The Cloudcast, Lead Cloud Analyst for Wikibon

May 16, 2016

Exploring the Best Ways to Merge Technology After a Merger or Acquisition

By Daniel Newman

Lack of foresight when it comes to merging IT systems is one of the biggest roadblocks to a successful merger and acquisition (M&A). Regardless of the driving… Read More

By Daniel Newman
Founder and President, Broadsuite, Inc.

April 7, 2016

Subduing Shadow IT No Longer Works

By Daniel Newman

IT departments increasingly face challenges because of the rapid pace of technological advancement. As companies realize the need to maintain pace with mobile… Read More

By Daniel Newman
Founder and President, Broadsuite, Inc.

December 14, 2015