保护IT:快速部署与敏捷替代方案.pptxVIP

  • 0
  • 0
  • 约5.38千字
  • 约 24页
  • 2026-03-09 发布于北京
  • 举报

[Protected]Non-confidentialcontentWithWebApplicationSecuritySecuringShadowIT

[Protected]Non-confidentialcontent“Theactofpurchasingorusing

technologyfortheworkplacewithout

theapprovalorknowledgeofthe

ITdepartmentiscalledShadowITGartner

?2014CheckPointSoftwareTechnologiesLtd.3[Restricted]ONLYfordesignatedgroupsandindividualsShadowIT=HardwareorSoftware

thatisnotsupportedbytheITDevicesServicesApplications[Protected]Non-confidentialcontent

[Protected]Non-confidentialcontent

[Protected]Non-confidentialcontentPerceptiononITSo,WhyDoPeopleShadowIT?PerceptiononShadowITBureaucraticSlowResponseFastDeploymentAgileAlternativesITbuildapplicationsservicestolast

withgoodarchitecturetofitallscenariosBusinessprocessarebuildfornow

toanswerimmediateneedsAnywhereAccessCollaborationProductivity

[Protected]Non-confidentialcontentMorethanthreequarters(76%)ofITdecisionmakerssaydepartmentsintheirorganizationaresourcingandcommissioningproductsandserviceswithnoinputfromtheITdepartmentSHADOWIT–ISHERERecentsurveyfromBTGlobalServices.n=1000

[Protected]Non-confidentialcontentBiggestSecurityConcernsabout

Shadow-ITforCIOsRecentsurveyfromBTGlobalServicesn=1000Securityofalltheorganizationsdata75%SecurityoftheentireITinfrastructure73%

[Protected]Non-confidentialcontentSecurityRisksof

ShadowITDataLossReliabilityVulnerabilitiesCompliance

[Protected]Non-confidentialcontentSecurityRisksof

ShadowITAnyregulationthatrequiresyoutoKNOWandUNDERSTANDyourITecosystemwouldhaveanissuewithShadowIT.PCI-DSS:

Fundamentalrequirementtodefinethescopeofnetworkenvironment.NERCCIP(CriticalInfrastructure):

RequiresITownerstounderstandtheirITenvironmentindetailSarbanesOxley/CobiT5:

Firmsmustrecorddataontheirinternalandexternaloperatingenvironment

[Protected]Non-confidentialcontentWhatisneed

文档评论(0)

1亿VIP精品文档

相关文档