{"id":1193,"date":"2015-07-20T15:51:04","date_gmt":"2015-07-20T19:51:04","guid":{"rendered":"http:\/\/209.208.108.186\/?p=1193"},"modified":"2015-07-20T22:10:12","modified_gmt":"2015-07-21T02:10:12","slug":"can-you-see-your-enterprise-shadow-it","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/","title":{"rendered":"Can you see your enterprise shadow IT?"},"content":{"rendered":"<p><a href=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1197\" src=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg\" alt=\"shadow-it-300x171\" width=\"300\" height=\"171\" \/><\/a>Can you? It\u2019s there\u2026hidden on your employees\u2019 devices and on your network. We all know people try to use the path of least resistance in getting something done. Today, cloud computing allows us all to do almost anything from anywhere with relatively no resistance at all. Within corporations though, this can become a problem commonly known as shadow IT. \u201cThere are an astonishing 10,000 cloud services available on the market today, which creates a growing problem for IT around Shadow IT as only 9.3 percent of those apps meet enterprise data, security and legal requirements, cloud security company Skyhigh Networks found in its Q1 2015 Cloud Adoption and Risk Report.\u201d Corporations need to control their proprietary information, network, and Web security. While employees may be thinking they can get their job done faster, the corporation is thinking about threats. \u201cThe result is technologies that empower individuals and teams limit the organisation as a whole.\u201d<\/p>\n<p>There are several views for this, all valuable. From the employees\u2019 view, they believe they are finding ways to be more productive and efficient by using technology that is easily accessible and likely, not costing the corporation anything additional. It is quick and easy and can get the job done before the IT department would even have a chance to look at a request form. So, why would the corporation be upset? Here\u2019s why&#8211;unauthorized applications, or shadow IT, can cause serious risks, such as Malware, data loss, and other severe network security concerns. As the responsible party, IT needs to know what is happening, especially when it comes to the random unauthorized applications users are bringing into the network.<\/p>\n<p>What can be done? Which view holds more importance? That depends on your organization but gathering the information to make that decision can be quick and easy. You need total visibility into Web use so you can find and analyze any potential shadow IT. Proactive, comprehensive reporting of all Web-use activity allows a full view of users\u2019 activities. IT and management need to see detailed drill-down activity per user, per group, or per category, and determine if the \u201cshadow\u201d application is to be quarantined, or discover the application is actually useful to the organization as a whole and add to the acceptable applications list.<\/p>\n<p>It is important to take into consideration the employees\u2019 need to have access to useful and contemporary tools. No post, article, or news story can tell you what to do within your organization. Only you know what will best suit your environment. Try collaboration though, between users, management, and IT. The key is to find the most useful applications and move toward applications that work, with the best interest of the overall corporation at heart.<\/p>\n<p><a href=\"https:\/\/www.prweb.net\/Redirect.aspx?id=aHR0cHM6Ly93d3cud2F2ZWNyZXN0Lm5ldA==\">Wavecrest Computing<\/a> has been the recognized leader in Web Security for over 19 years with CyBlock and Cyfin Solutions. These scalable filtering and forensic reporting analysis products are designed to enable organizations to successfully address Internet abuse, legal liability, shadow IT, workforce productivity, and Web security threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Can you? It\u2019s there\u2026hidden on your employees\u2019 devices and on your network. We all know people try to use the path of least resistance in getting something done. Today, cloud computing allows us all to do almost anything from anywhere with relatively no resistance at all. Within corporations though, this can become a problem commonly [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,205,72,9],"tags":[486,485,487,484,374],"class_list":["post-1193","post","type-post","status-publish","format-standard","hentry","category-acceptable-use-policy","category-industry-news","category-legal-liability","category-security-threats","tag-cloud-security","tag-cloud-services","tag-risk-report","tag-shadow-it","tag-web-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Can you see your enterprise shadow IT? - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can you see your enterprise shadow IT? - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"Can you? It\u2019s there\u2026hidden on your employees\u2019 devices and on your network. We all know people try to use the path of least resistance in getting something done. Today, cloud computing allows us all to do almost anything from anywhere with relatively no resistance at all. Within corporations though, this can become a problem commonly [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-20T19:51:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-21T02:10:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Can you see your enterprise shadow IT?\",\"datePublished\":\"2015-07-20T19:51:04+00:00\",\"dateModified\":\"2015-07-21T02:10:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/\"},\"wordCount\":505,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg\",\"keywords\":[\"cloud security\",\"cloud services\",\"risk report\",\"shadow it\",\"web security\"],\"articleSection\":[\"Acceptable Use Policy\",\"Industry News\",\"Legal Liability\",\"Security Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/\",\"name\":\"Can you see your enterprise shadow IT? - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg\",\"datePublished\":\"2015-07-20T19:51:04+00:00\",\"dateModified\":\"2015-07-21T02:10:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#primaryimage\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Can you see your enterprise shadow IT?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can you see your enterprise shadow IT? - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/","og_locale":"en_US","og_type":"article","og_title":"Can you see your enterprise shadow IT? - Wavecrest Blog","og_description":"Can you? It\u2019s there\u2026hidden on your employees\u2019 devices and on your network. We all know people try to use the path of least resistance in getting something done. Today, cloud computing allows us all to do almost anything from anywhere with relatively no resistance at all. Within corporations though, this can become a problem commonly [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2015-07-20T19:51:04+00:00","article_modified_time":"2015-07-21T02:10:12+00:00","og_image":[{"url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Can you see your enterprise shadow IT?","datePublished":"2015-07-20T19:51:04+00:00","dateModified":"2015-07-21T02:10:12+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/"},"wordCount":505,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg","keywords":["cloud security","cloud services","risk report","shadow it","web security"],"articleSection":["Acceptable Use Policy","Industry News","Legal Liability","Security Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/","url":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/","name":"Can you see your enterprise shadow IT? - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#primaryimage"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg","datePublished":"2015-07-20T19:51:04+00:00","dateModified":"2015-07-21T02:10:12+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#primaryimage","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/07\/shadow-it-300x171.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/can-you-see-your-enterprise-shadow-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Can you see your enterprise shadow IT?"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=1193"}],"version-history":[{"count":3,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1193\/revisions"}],"predecessor-version":[{"id":1199,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1193\/revisions\/1199"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=1193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=1193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=1193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}