dcsimg

Five Tips for Overcoming Shadow IT in the Enterprise

  • Five Tips for Overcoming Shadow IT in the Enterprise-

    Identify and control

    The first step in overcoming shadow IT is to identify it. Without insight into what tools users are purchasing and using at work, it's impossible to know how to manage them. The second is controlling it. This may be accomplished through a combination of whitelists, whereby unauthorized applications cannot be run on company-issued IT assets, and notification tools that alert IT if someone does attempt to run an unauthorized app.

1 | 2 | 3 | 4 | 5 | 6 | 7

Five Tips for Overcoming Shadow IT in the Enterprise

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • Five Tips for Overcoming Shadow IT in the Enterprise-2

    Identify and control

    The first step in overcoming shadow IT is to identify it. Without insight into what tools users are purchasing and using at work, it's impossible to know how to manage them. The second is controlling it. This may be accomplished through a combination of whitelists, whereby unauthorized applications cannot be run on company-issued IT assets, and notification tools that alert IT if someone does attempt to run an unauthorized app.

Shadow IT is here to stay! By enabling capabilities that make it easier for employees to do their jobs better, shadow IT has cemented its place in organizations. IT has a choice. It can embrace it and effectively manage the shadow IT initiatives to ensure that company policies are being complied with. Or it can reject it, and run the risk of being branded as an impediment to success and continue fighting a battle IT cannot win. The following are five tips for managing shadow IT in the enterprise, identified by Chris Smith, CMO, Zenoss.