Shadow IT

Once upon a time (a long time ago it seems), your IT department created the applications and solutions that users needed. IT lead the users. Now users find and use whatever applications they want, whether their IT department supplies them or now. Users are now in control.

These applications, if they aren't provided or sanctioned by IT, become "ShadowIT" and brings risks that needed to be understand and controlled.

Understand your use of over 25,000 available cloud services. Which ones are risky, which steal your IP or sell your data. Know where they are hosted, what accreditations (if any) their datacentres have. Is your data encrypted? Is the service known to have been breached? Do they keep your data even if you cancel their service?

+ 50 other attributes. 

Skyhigh's ShadowIT solution allows you to understand and take control of user-lead cloud adoption, to understand what data is going where and to quantify and remediate the associate risks.


NZ, organisations typically use 25-80 brand new cloud services every week! If you rely on manual intervention to control the use of cloud services, you will always be playing ‘catch-up”.

Using ‘attribute-based” automatic policies you may guide users away from risky sites, the very first time anyone tries to use them.

Talk to

Robin WhitAker

Robin has worked with dozens of organisations to embrace the best that Cloud has to offer while governing cloud use to manage risks. 

Email [email protected]