We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Back to Insights

Top Methods for Finding Shadow IT

December 18, 2017 | Key Infosec Reports

IT departments appear to be moving towards more active methods of monitoring and employing technology in an effort to gain better visibility into shadow IT. Next-generation firewalls have replaced database activity monitoring as the most common method being used.



Please Login to continue

Related Research

4/16/2018 | Content Aggregator
Overview of Biggest Obstacles to Managing Security

3/8/2018 | Content Aggregator
Security is Consumers’ Top Priority for Most Apps

12/26/2017 | Content Aggregator
39% of Firms Do Not Require Security Awareness Training for All Employees