04. April 2024, Sebastian Wasik | IT Security

Under the radar: Shadow IT – the eternal battle

For IT admins, seamless monitoring of their network endpoints is one of the most important prerequisites for detecting and preventing security threats as early as possible. Shadow IT – unauthorized hardware and software on the company network – is a long-standing concern. And new studies show that the challenge is not getting any smaller. 

Read more


  • Tags:
  • shadow it

04. April 2024, Sebastian Wasik | IT Security

Under the radar: Shadow IT – the eternal battle

For IT admins, seamless monitoring of their network endpoints is one of the most important prerequisites for detecting and preventing security threats as early as possible. Shadow IT – unauthorized hardware and software on the company network – is a long-standing concern. And new studies show that the challenge is not getting any smaller. 

Read more


  • Tags:
  • shadow it
Entries 28 to 36 of 156