We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Back to Insights

Top Methods for Finding Shadow IT

December 18, 2017 | Key Infosec Reports

IT departments appear to be moving towards more active methods of monitoring and employing technology in an effort to gain better visibility into shadow IT. Next-generation firewalls have replaced database activity monitoring as the most common method being used.


IANS

— CLIENT PORTAL —

 SUBSCRIPTION REQUIRED
Please Login to continue



Related Research

4/16/2018 | Content Aggregator
Overview of Biggest Obstacles to Managing Security


3/8/2018 | Content Aggregator
Security is Consumers’ Top Priority for Most Apps


12/26/2017 | Content Aggregator
39% of Firms Do Not Require Security Awareness Training for All Employees