By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Shining a light on shadow IT
Share
Aa
TechgoonduTechgoondu
Aa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Shining a light on shadow IT
Enterprise

Shining a light on shadow IT

Techgoondu
Last updated: September 3, 2015 at 10:03 AM
Techgoondu Published September 3, 2015
7 Min Read
SHARE

Brought to you by WatchGuard

When news broke recently of Hillary Clinton running her own e-mail server, it showed at once the reason why people turn to shadow IT and the risks involved.

Critics rightly asked if a private server had the security required for handling sensitive e-mails for the former United States Secretary of State.

At the same time, her explanation – that she wanted her personal and work e-mails in one device under her control – resonated with end users who want the ease and speed of using their own systems.

For them, outdated IT infrastructure and slow approval processes are hampering the way they work. The alternative is to bring their own “everything”, from a personal laptop to cloud services such as Dropbox.

This loss of control has been an issue for IT departments worldwide for a few years now. Now, with the spectre of cyber attacks looming after several high-profile break-ins of late, the vulnerabilities caused by shadow IT are hard to ignore any more.

A healthcare organisation risks running afoul of the law if a member of its staff decides to store sensitive data on unsecure cloud services meant for personal use.

Simply forwarding one’s corporate e-mails to personal accounts negates the effectiveness of a company’s well set-up cyber defences. It brings sensitive data to the Wild, Wild West of the public Internet.

How then do IT departments keep up? For many IT leaders, the attitude has changed from an absolute refusal to allow third-party software and devices to one that accommodates and better regulates them.

After all, shadow IT is not going to go away. Kept from using their favourite devices, users end up going underground, hiding their devices and software until a big problem appears. All this while, chief information officers (CIOs) won’t be for the wiser.

But there are a few things CIOs can do. For one, they can identify the pain points for end users in the organisation. For starters, why are these employees turning to their own instant messengers and file sharing services?

Usually, the intention is noble. That is, they just want to get the job done faster and better. By forcing them to go on a slower, less efficient way of doing things without explaining why, IT leaders not only alienate users but become a barrier to their productivity.

Facing these issues, CIOs have to deploy apps that provide similar functionalities but which are hardened, security-wise. They could also give a choice and a measurable cloud budget to departments to pick from a few secure options, so they are not just told to use what’s given to them.

Richer tools to see what’s going on

Whatever the incentive, there will still always be users who prefer to stick to their own way of doing things. The rogue setups here, like unpatched PCs or software, will not go away despite the best intentions of an organisation.

The surest way to counter this is to have more visibility and manageability in one’s systems. IT leaders have to not just suss out potential hackers but also users who inadvertently would open up the organisation to attacks with their shadow IT.

In October 2013, research firm Frost & Sullivan found that application vulnerabilities and malware were the top two threats identified by information security professionals. It called for richer tools to manage across security technologies.

The bottomline was clear – an easier way for IT professionals to monitor and look out for rogue apps in a BYOX (bring your own X) environment.

That improved visibility is what WatchGuard’s Dimension solution provides to organisations today. Cloud-ready, it provides a set of tools to identify and distil key network security threats, issues and threats. Armed with this information, organisations can set meaningful security policies across a network.

The key difference that WatchGuard provides is an aggregated “big picture” view that empowers decision makers to make calls that target an issue, while enabling other users to continue their IT usage.

What would be useful, especially to system administrators, is an ability to see details such as clients using the most bandwidth, possibly for “cyber loafing”.

Also useful is an easy-to-visualise threat map that shows a geographical view of systems. This lets a system administrator see where a threat may be from and target it accurately.

Visibility is key. What system administrators would like too is a way to catch unauthorised app usage and to separately view the flow of network traffic to detect misconfigurations. Of course, having a dashboard to monitor activity is just a start. Perhaps more important is the ability to take immediate action based on that intelligence.

Can an administrator block clients that are seen to be running unauthorised apps, for example? Or easily manage VPN connections and firewall configurations on the fly?

With these capabilities, organisations can more confidently tackle many of the issues involved with shadow IT. They also help shine a light on the practice, mitigating the risks involved.

After all, shadow IT is most dangerous when it is in the shadows. Understanding why users turn to them and monitoring any such rogue setups will enable organisations to better confront a problem facing even the most powerful government in the world.

More information on WatchGuard Dimension can be found at: http://www.watchguard.com/wgrd-products/dimension

You Might Also Like

Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage

RedCap: A new cellular IoT technology for the 5G era

Q&A: Delivering movies digitally and securely from around the world

In remote Taiwan, firefighters use a 5G base station “in a box” when responding to emergencies

Sensing strong demand, Tata Comms pitches “hyperconnected” ecosystems

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Techgoondu September 3, 2015
Share this Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Copy Link Print
Share
Previous Article Singapore startup debuts “urban operating system”
Next Article Modernising business apps for a mobile, cloud-based world
Leave a comment

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

Facebook Like
Twitter Follow

Latest News

As TikTok faces a possible ban in the US, should users elsewhere be worried?
Cybersecurity Internet March 24, 2023
Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage
Enterprise Internet March 23, 2023
RedCap: A new cellular IoT technology for the 5G era
Enterprise Software Telecom March 23, 2023
Sony Playstation VR2 review: An immersive experience awaits
Gaming March 21, 2023
//

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
Follow US

© 2023 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact

Join Us!

Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Lost your password?