- 0
- 0
- 约5.38千字
- 约 24页
- 2026-03-09 发布于北京
- 举报
[Protected]Non-confidentialcontentWithWebApplicationSecuritySecuringShadowIT
[Protected]Non-confidentialcontent“Theactofpurchasingorusing
technologyfortheworkplacewithout
theapprovalorknowledgeofthe
ITdepartmentiscalledShadowITGartner
?2014CheckPointSoftwareTechnologiesLtd.3[Restricted]ONLYfordesignatedgroupsandindividualsShadowIT=HardwareorSoftware
thatisnotsupportedbytheITDevicesServicesApplications[Protected]Non-confidentialcontent
[Protected]Non-confidentialcontent
[Protected]Non-confidentialcontentPerceptiononITSo,WhyDoPeopleShadowIT?PerceptiononShadowITBureaucraticSlowResponseFastDeploymentAgileAlternativesITbuildapplicationsservicestolast
withgoodarchitecturetofitallscenariosBusinessprocessarebuildfornow
toanswerimmediateneedsAnywhereAccessCollaborationProductivity
[Protected]Non-confidentialcontentMorethanthreequarters(76%)ofITdecisionmakerssaydepartmentsintheirorganizationaresourcingandcommissioningproductsandserviceswithnoinputfromtheITdepartmentSHADOWIT–ISHERERecentsurveyfromBTGlobalServices.n=1000
[Protected]Non-confidentialcontentBiggestSecurityConcernsabout
Shadow-ITforCIOsRecentsurveyfromBTGlobalServicesn=1000Securityofalltheorganizationsdata75%SecurityoftheentireITinfrastructure73%
[Protected]Non-confidentialcontentSecurityRisksof
ShadowITDataLossReliabilityVulnerabilitiesCompliance
[Protected]Non-confidentialcontentSecurityRisksof
ShadowITAnyregulationthatrequiresyoutoKNOWandUNDERSTANDyourITecosystemwouldhaveanissuewithShadowIT.PCI-DSS:
Fundamentalrequirementtodefinethescopeofnetworkenvironment.NERCCIP(CriticalInfrastructure):
RequiresITownerstounderstandtheirITenvironmentindetailSarbanesOxley/CobiT5:
Firmsmustrecorddataontheirinternalandexternaloperatingenvironment
[Protected]Non-confidentialcontentWhatisneed
原创力文档

文档评论(0)