Articles
Pros and Cons: Do-It-Yourself Approaches to Monitoring Shadow IT & Cloud Services
2 min read
Shadow IT is estimated to be 20-40 percent beyond the traditional IT budget. The ease by which organizations can purchase apps and services from cloud service providers (CSP) contributes significantly to this spending. This is an eye-catching number worthy of investigation—not only to identify and reduce costs, but to discover business risks. So, it is […]
Q&A: Cisco IT’s Lessons Learned In Assessing the Risk of New Cloud Services
4 min read
2,000+ That is the approximate number of cloud services that Ken Hankoff, Manager of Cisco IT Risk Management’s Cloud and Application Service Provider Remediation (CASPR) Program believes Cisco’s 70,000 employees use. For the last 14 years, this program has assessed and remediated risks associated with using a cloud-hosted service. An assessment process for new cloud […]
Steps to Overcome the Business Risks of Cloud Services
3 min read
Do any web search on the inhibitors of moving to cloud and you’ll find a primary challenge rises to the top—business risk. The benefits of cloud often outweigh risks,...
Summary: Mitigating Business Risks
1 min read
Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing data security, and instituting cloud-specific employee policies.
Summary: Governing the World of Many Clouds with Cisco Cloud Consumption Optimization Service
1 min read
CIOs face a scary reality. They only know about 5-10% of the cloud applications that are being used within their organization. This shadow IT is ripping holes in their security strategies. In fact, a recent Forrester study cited that 43% of respondents said they believed shadow IT practices were major threats to their respective organizations. […]
Governing the World of Many Clouds with Cisco Cloud Consumption Optimization Service
2 min read
CIOs face a scary reality. They only know about 5-10% of the cloud applications that are being used within their organization. This shadow IT is ripping holes in their security strategies. In fact, a recent Forrester study cited that 43% of respondents said they believed shadow IT practices were major threats to their respective organizations. […]
Governing the New Wild West….The World of Many Clouds
3 min read
In many ways, the race to the cloud resembles the Wild West of the 1800s. The urgency with which business groups are rushing to adopt cloud services, often without IT involvement, resembles the race out to the western US of those looking for gold. With our customer engagements, we have found that there are 5-10 […]
Protect Yourself Against the Next Security Flaw in the Cloud—Understand Shadow IT
2 min read
Recently, a bug in Internet Explorer made it possible for hackers to take over a user’s computer causing government agencies to suggest using a different browser. The Heartbleed flaw opened the door for encrypted data to be intercepted. These latest challenges highlight one thing inherent to any application—whether on premise or in the cloud—it is […]
Beyond Data Security…Five Biggest Risks of Shadow Cloud IT Services
4 min read
About two years ago, I went into a customer workshop on private cloud. As we were introducing ourselves around the table, the CIO turned to me with a pained expression and said, “Bob I have a different problem. My CFO and CEO just asked me if I knew how many of our users were accessing […]
1