When business users—and sometimes even IT personnel—“go rogue” and deploy unsanctioned equipment and applications, a lot of problems can occur. Here’s a guide to the causes, implications and solutions of shadow IT.
25-04-2016
When business users—and sometimes even IT personnel—“go rogue” and deploy unsanctioned equipment and applications, a lot of problems can occur. Here’s a guide to the causes, implications and solutions of shadow IT.