Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • IT Management

    Fighting Shadow IT: 10 Best Practices to Prevent Enterprise Data Leaks

    By
    Chris Preimesberger
    -
    October 21, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Fighting Shadow IT: 10 Best Practices to Prevent Enterprise Data Leaks

      1 - Fighting Shadow IT: 10 Best Practices to Prevent Enterprise Data Leaks

      by Chris Preimesberger

      2Protect All Data, Everywhere

      2 - Protect All Data, Everywhere

      Data fragmentation, or data outside IT-managed systems stored on personal computers, devices and cloud services, is a real risk to corporate security. Shadow IT fragments business data and creates conflicting versions of information, increasing the chance of data leakage or loss. Enterprises need to protect all forms of business data by empowering IT to take the lead on data encryption and backup practices and create guidelines for management of data on personal or “nonauthorized” devices and services.

      3Understand and Streamline Your Data

      3 - Understand and Streamline Your Data

      Businesses should establish policies and procedures for data types to determine what data is most valuable and how long it should be retained. Where possible, automation should be used to transfer less used or old data to an archive, freeing storage space while retaining the older data for specific usage later. This reduces the storage costs of data for immediate use, which generally increase incrementally due to the tendency to retain all information.

      4Take Your Archive to the Cloud

      4 - Take Your Archive to the Cloud

      Enterprises can reduce storage cost by using archiving systems to manage information that needs to be kept long-term when it is no longer active. By leveraging the cloud, businesses can use an always-online cloud service that enables access to data via a browser or mobile app. This effectively turns an archive into a valuable interactive repository of historical business data.

      5Single Solution: Unify Where Data Exists

      5 - Single Solution: Unify Where Data Exists

      Companies are increasingly using the cloud to create a shared infrastructure model for IT utilizing both on-premises and cloud services. By using a single platform to manage information in the data center, at the edge and in the cloud, IT can make access to data secure while ensuring that laptops and desktops can be backed up with the same software that protects the data center.

      6Sync and Provide Access to Data Virtually Anywhere

      6 - Sync and Provide Access to Data Virtually Anywhere

      Whether on a desktop, laptop or mobile device, employees expect access to company data. If enterprises don’t provide a secure solution for access to corporate data, employees will find their own ways to manage information to work efficiently using consumer products that can put the organization at risk. By efficiently managing, syncing and protecting data, IT organizations can provide employees with anywhere/anytime access to information on-the-go while maintaining secure controls and adhering to corporate policies.

      7Eliminate Redundant Data

      7 - Eliminate Redundant Data

      Confusion is often the result when copies of the same document are being saved by multiple people in several different places; this drives employees to save documents using third-party consumer solutions. Through global deduplication, businesses can ensure that one copy of the document exists and can provide employees with access to it only through the secure enterprise solution the IT manages and chooses to use for the organization.

      8Centralize Visibility, but Don’t Enforce Control

      8 - Centralize Visibility, but Don't Enforce Control

      Visibility into what employees are doing is critical for compliance, deploying and deactivating applications, and other requirements. However, many organizations use this visibility to enforce control. The result is that employee productivity is negatively affected, giving rise to shadow IT apps and processes. Successful companies embrace modern tools and platforms that allow centralized visibility and manage control in a trusted manner that empowers users.

      9Evolve Beyond Perimeter Authentication

      9 - Evolve Beyond Perimeter Authentication

      Identity management has moved beyond the days when it was acceptable to simply authenticate users at the network perimeter and trust their actions thereafter. With the growing acceptance of mobility, cloud and shadow IT, enterprises need to evolve beyond perimeter-based authentication. They need to have context about all the employees and know what actions users are trying to complete; they also need to know if the user should be permitted to take the specific action he or she wants to take.

      10Invest in Self-Service

      10 - Invest in Self-Service

      Shadow IT is partly driven by business users and developers becoming frustrated with traditional IT procurement and deployment cycles. Give users and developers the access and control they crave by creating self-service portals for provisioning IT resources and services. This is more than the old help desk ticket portal; this means building an enterprise app store for users and IT services portal for developers. Provisioning from these portals should be automated (with approvals built into the workflow as needed), which means the underlying resources—compute, storage, network, firewall, app delivery, monitoring—need to be programmable.

      11Educate Users About the Benefits and Risks

      11 - Educate Users About the Benefits and Risks

      If you want to change behavior, you need to explain why the IT way is better than the shadow-IT way. Shadow IT presents a headache for IT for lots of reasons: security, cost, troubleshooting time and so on. But that’s not what makes a compelling case to users and developers who are working around the system. Instead, put the benefits (and risks) in their terms. For example, IT can provide performance service-level agreements that shadow IT may not be able to provide, and IT can negotiate vendor agreements at scale that get better prices than shadow side deals.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×