Shadow IT Isn’t Something To Fear

Chad Berndtson


Shadow IT introduces risk to an organization, but security professionals can stay ahead of that risk by designing an architecture that both protects users and preserves the freedom to innovate and adopt software-as-a-service (SaaS) tools that spur business productivity. 

In a recent column for SecurityWeek, Scott Gainey argues that an effective strategy for shadow IT must confront certain realities, including that most security operations don’t have a handle on all the SaaS tools in use by organizations, and that Bring Your Own “X” policies have completely changed the traditional security perimeter.

Head here to read Scott’s analysis and his advice for how to design security solutions with those realities in mind.

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.


© 2018 Palo Alto Networks, Inc. All rights reserved.