Shadow IT introduces risk to an organization, but security professionals can stay ahead of that risk by designing an architecture that both protects users and preserves the freedom to innovate and adopt software-as-a-service (SaaS) tools that spur business productivity.
In a recent column for SecurityWeek, Scott Gainey argues that an effective strategy for shadow IT must confront certain realities, including that most security operations don't have a handle on all the SaaS tools in use by organizations, and that Bring Your Own "X" policies have completely changed the traditional security perimeter.
Head here to read Scott's analysis and his advice for how to design security solutions with those realities in mind.