Why a security team embraces shadow IT 

When you hear the phrase “getting ahead of shadow IT,” it typically comes from a CIO who is implementing new technologies so that employs won’t take it upon themselves to purchase tools. But you don’t expect such proactive practices from an enterprise’s information security team, which a CIO often enlists to place a moat around corporate assets.Mike Bartholomy, Western Union’s senior manager for information securityMike Bartholomy takes a different tack at Western Union. The financial services firm’s senior manager for information security says that companies that try to block everything may see it backfire. “What we’ve seen happen in other organizations is that when you take something away that is a great enablement tool that may be moderately risky, you run the risk of pushing users towards something that is very risky,” Bartholomy says.Shadow IT continues to plague companies. Over the next several years IT spending will increasingly occur outside the allotted IT budget, often exceeding 30 percent of total IT spending, according to Gartner analyst Matt Cain. The analyst says that rather than blocking shadow IT, IT should develop a system that outlines when it is appropriate for employees to use their own technology solutions and when IT should take the lead. The idea is to create a digital workplace that aligns corporate workflow more closely to employees’ experiences with consumer computing.9 ways to bend Windows 10 to your willCustomize Windows 10 to your liking, not theirs.READ NOWWhy aninfosec team implements cloudWestern Union has developed its own system to protect and serve its workforce. The Western Union information security enablement (WISE) program is designed to give its 10,000 employees the technologies it needs to get their jobs done while ensuring that corporate data is secure. Under the purview of CIO David Thompson, Bartholomy and the rest of the information security team enjoy the unusual privilege of evaluating and implementing cloud solutions. “Not too many information security organizations have integrated a social intranet and collaboration tool enterprise-wide,” Bartholomy says.

Source: Why a security team embraces shadow IT | Network World

Be Sociable, Share!

Leave a Reply

Your email address will not be published. Required fields are marked *