It is always interesting when companies develop “shadow IT” capabilities (i.e. a department implementing an application or hosting an application in the cloud without involving the IT organization). This article from CIO Dive discusses IBM’s new Cloud Security Enforcer that should give IT organizations a way to more easily detect and respond to the these types of capabilities. My only complaint is that the technology appears to ignore the internal Shadow IT (i.e. the server under someone’s desk).
Read the article at: IBM introduces tool to detect unauthorized ‘shadow IT’ | CIO Dive
Comments are closed.