Shadow IT - Examples

Examples

Some examples of these unofficial data flows are USB sticks or other portable data storage devices, MSN Messenger or other online messaging software, Gmail or other online e-mail services, Google Docs or other online document sharing and Skype or other online VOIP software, and also other less straightforward products self-developed Access databases and self-developed Excel spreadsheets and macros. Security risks are introduced when data or applications are moved outside protected systems, networks, physical location or security domains.

A 2012 French survey of 129 IT managers revealed some examples of Shadow IT : Excel Macro 19% software 17% Cloud solutions 16% ERP 12% BI systems 9% Websites 8% hardware 6% VoIP 5% Hidden IT guy 5% Shadow IT project 3% What is the shadow member in software project 70% BYoD 3%

Read more about this topic:  Shadow IT

Famous quotes containing the word examples:

    It is hardly to be believed how spiritual reflections when mixed with a little physics can hold people’s attention and give them a livelier idea of God than do the often ill-applied examples of his wrath.
    —G.C. (Georg Christoph)

    Histories are more full of examples of the fidelity of dogs than of friends.
    Alexander Pope (1688–1744)