1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

4 ways to apply SLAs to shadow IT

Discussion in 'Network World' started by RSS, Apr 20, 2016.

  1. RSS

    RSS New Member Member

    The risks and costs of shadow IT have been always been a concern for IT organizations. Yet the business clearly values the capability to procure certain IT services to rapidly meet its changing business needs — so much so that these informal IT capabilities are springing up even more often than IT leaders realize. One 2015 report by Cisco indicated that the number of unauthorized cloud applications being used in the enterprise, for example, was 15 to 10 times higher than CIOs estimated.

    [ Related: CIOs vastly underestimate extent of shadow IT ]

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page