Bringing IT out of the shadows

被引:0
作者
Johnson, Steve [1 ]
机构
[1] Extreme Networks, United States
关键词
D O I
10.1016/S1353-4858(13)70134-X
中图分类号
学科分类号
摘要
Bring Your Own Device (BYOD) is currently a hot topic, but it is only one (albeit major) part of the broader 'shadow IT' challenge. Shadow IT - where business users implement a solution outside the official corporate architecture without consulting the IT department - can include everything from the use of free online services to departmental decisions to adopt SaaS solutions, let alone the actual importing of users' own hardware devices. Bring Your Own Device (BYOD) is currently a hot topic, but it is only part of the broader 'shadow IT' challenge. There is no silver bullet for solving a problem as complex as shadow IT. However, policy-based networking offers a very useful approach, as it builds policies into the network operating system where they can be centrally managed and maintained up to date, explains Steve Johnson of Extreme Networks. © 2013 Elsevier Ltd.
引用
收藏
页码:5 / 6
页数:1
相关论文
共 50 条