HIT Consultant Insightful coverage of healthcare innovation
 

shadow it

Results 1 - 25 of 52Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Gain visibility of cloud services in use and block risky apps to improve security with three easy steps.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Employees in every industry are expected to work quickly, but they’re often frustrated by company-issued apps. As a result, they’re downloading personal apps to get the job done instead of using secure, enterprise-approved tools. It’s called shadow IT, and it’s gaining traction fast.
Tags : 
    
Cisco Umbrella EMEA
Published By: Ricoh     Published Date: Sep 16, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success.• Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Workday     Published Date: Jul 30, 2019
Does digital disruption foreshadow the end for the CIO? With the role of chief digital officer gaining momentum, today’s CIOs are being forced to consider their place in the enterprise. Read this paper to see how CIOs are redefining their value, focusing on innovation, transformation, and enterprise leadership.
Tags : 
    
Workday
Published By: Symantec     Published Date: Jul 31, 2017
Uncover shadow data lurking in the cloud with the industry’s first integrated cloud security solution that combines the best-in-class data loss prevention (DLP) and cloud access security broker (CASB) technologies from Symantec.
Tags : 
cloud, cloud security, dlp, casb
    
Symantec
Published By: ServiceNow     Published Date: Oct 02, 2015
Recent research revealed three different schools of thought about the use of shadow IT by end users.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 02, 2015
From students to executives, finding solutions to improve efficiency, productivity, and communication has become vital. These end users are trying to excel in their work, and while they don't mean to cause harm, in most organizations this desire leads to the use of applications, services, and data storage and sharing beyond IT's boundaries. This practice, known as “shadow IT,” walks a line that information security officers are uncomfortable with, and it's having an obvious impact on technical support teams. The good news is, there are opportunities for all support organizations, regardless of their stance on shadow IT.
Tags : 
    
ServiceNow
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: Globalscape     Published Date: Nov 14, 2016
Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is “no,” then your sensitive data may be vulnerable. In this guide from Globalscape, you’ll learn: • What shadow IT is and the drawbacks • Signs of a shadow IT problem • How to reduce shadow IT
Tags : 
globalscape, shadow it, data transfer methods, data breach
    
Globalscape
Published By: YLD     Published Date: Apr 27, 2016
IT departments are faced with new challenges, with increased competition, lower customer loyalty and globalisation. It all requires faster development while dealing with shadow IT, legacy systems and requirements for highly skilled teams, with expertise in new, disruptive technologies.
Tags : 
it department, customer loyalty, technology, it support, becoming a disruptive cio
    
YLD
Published By: Juniper Networks     Published Date: Feb 01, 2016
Download this eGuide and learn the following: How the cloud and mobile have changed the enterprise How to manage the security risks of shadow IT Benefits and adoption strategies for shadow IT How the Juniper Unite architecture can help
Tags : 
    
Juniper Networks
Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security
    
Qualys
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Gain visibility of cloud services in use and block risky apps to improve security with three easy steps.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Uncover and block unsanctioned apps across your enterprise with App Discovery and blocking by Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA
Published By: Nasuni     Published Date: Nov 19, 2014
In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices.
Tags : 
employee habits, corporate it systems, dropbox, it infrastructure
    
Nasuni
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: CA Technologies     Published Date: Jun 03, 2015
"Industry leaders share insights on DevOps and big data, ITIL, testing and more. Once again, we have spent time talking to leading community figures such as Dave Farley (“Continuous Delivery” author) to discuss the major issues impacting DevOps today. This latest issue features comments from 10 experts and covers many hot topics such as: - Enterprise DevOps transformation - DevOps and big data - DevOps and ITIL - Shadow IT vs DevOps - 6 Habits of Effective DevOps Practitioners - DevOps and Testing
Tags : 
    
CA Technologies
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.