Is Shadow IT Talking Over in your Enterprise?
(by Christian Verstraete, Chief Cloud Technologist for HP)
Many devices that are placed on the corporate networks can fly under the radar of the IT departments watchful eye. These devices include smart phones, wireless access points, tablets, home laptops and other types of computer hardware. In some cases, employees make VPN connections from non-corporate owned computers and leave them connected for days or even weeks. All of these devices take up corporate resources and put the company at greater risk for malware and electronic theft. What can be done?
One strategy involves disabling ports at the access switch that are not in use. This is a decent strategy except that it requires well maintained documentation as to what is plugged in and where. Keep in mind that users jump around and don’t always tell the helpdesk. This strategy also can lengthen some trouble shoots when the tech wants to plug a user into another port down at the wiring closet for quick testing. It becomes different if the spare reports have all been disabled. This strategy also doesn’t work for wireless devices. For these reasons, this “lock down” strategy can cause excessive administrative overhead, doesn’t address wireless users and it also doesn’t identify software applications.