Definition

rogue IT

Contributor(s): Rachel Lebeaux

Rogue IT is the use of unsanctioned information technology resources within an organization. 

The consumerization of IT has ushered in the use of employee-owned devices, including mobile phones, smartphones, tablet PCs and even wearable technology -- as well as the use of cloud services and cloud applications --  into the workplace. As this bring-your-own-device movement advances, IT organizations are often unaware of the specific technologies their employees are using in order to do their jobs. Some of these technologies can pose security risks, or raise questions regarding the ownership of the data the devices store or produce.

Although the term carries negative connotations, rogue IT is not all bad. The use of consumer tools in the enterprise can enable business agility and satisfy employees who would like to complete tasks using devices, services and applications they already own and know how to use.

See also: shadow IT, greynet

This was last updated in March 2014

Continue Reading About rogue IT

Dig Deeper on Leadership and strategic planning

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close