Author's arguments:
Shadow IT – where business users implement a solution outside the official corporate architecture
without consulting the IT department – can include everything from the use of free online services to departmental decisions to adopt SaaS solutions, let alone the actual importing of users’ own hardware devices.
After all, the prime driver for shadow IT is the desire to do one’s job effectively and to use whatever
tools can help – so an IT department that forbids this is no-one’s friend.
Policy-based networking offers a very useful solution to this dilemma.
The IT Department is now relieved of the need to play the heavy-handed policing role
Comments:
Define Shadow IT: software, services, harware
Approach: IT controls
How: make policies, control networks
Policy is only a way of restricting users. => IT department that forbids this is no-one’s friend
Bibligography:
Johnson, Steve. "Bringing IT out of the shadows." Network Security 2013.12 (2013): 5-6.
No comments:
Post a Comment