DBTA - How to Corral Sensitive Enterprise Data without Locking It Away from Users

in DBTA

By now it’s well documented that employees will take IT tasks into their own hands when IT cannot give them the support they need, and when they need it.  The phenomenon is ubiquitous and persistent, even to the point that it’s been dubbed “shadow IT.”  Gartner recently noted that by 2020, a third of successful attacks experienced by enterprises will be on their shadow IT resources.

Read more