It used to be a stray printer on a network, but today shadow IT comes in all shapes and sizes — and poses serious security threats. Jeff Keating and Jaineesh Davda of FormAssembly discuss how to manage shadow IT and protect your critical data.
In this video interview with Information Security Media Group, Keating and Davda discuss:
- The new shadow IT – and why it’s a top concern
- How shadow IT often ties back to poor data management
- How to manage and monitor data access