CINXE.COM

What Is Shadow IT? - Meaning, Examples & More | Proofpoint US

<!DOCTYPE html> <html lang="en-us" dir="ltr" prefix="content: http://purl.org/rss/1.0/modules/content/ dc: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ og: http://ogp.me/ns# rdfs: http://www.w3.org/2000/01/rdf-schema# schema: http://schema.org/ sioc: http://rdfs.org/sioc/ns# sioct: http://rdfs.org/sioc/types# skos: http://www.w3.org/2004/02/skos/core# xsd: http://www.w3.org/2001/XMLSchema# " class="page-en"> <head> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-MGR7P8X');</script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-B1V8SZE3GL"></script> <script>window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-B1V8SZE3GL');</script> <script>(function(){var a=window.mutiny=window.mutiny||{};if(!window.mutiny.client){a.client={_queue:{}};var b=["identify","trackConversion"];var c=[].concat(b,["defaultOptOut","optOut","optIn"]);var d=function factory(c){return function(){for(var d=arguments.length,e=new Array(d),f=0;f<d;f++){e[f]=arguments[f]}a.client._queue[c]=a.client._queue[c]||[];if(b.includes(c)){return new Promise(function(b,d){a.client._queue[c].push({args:e,resolve:b,reject:d})})}else{a.client._queue[c].push({args:e})}}};c.forEach(function(b){a.client[b]=d(b)})}})();</script> <script data-cfasync="false" src="https://client-registry.mutinycdn.com/personalize/client/d454424c4514a20a.js"></script> <meta charset="utf-8" /> <meta name="description" content="Shadow IT occurs when users deploy cloud services within an organization without IT&#039;s knowledge. Read more on Shadow IT, the meaning, examples, and more." /> <link rel="shortlink" href="https://www.proofpoint.com/us/threat-reference/shadow-it" /> <link rel="canonical" href="https://www.proofpoint.com/us/threat-reference/shadow-it" /> <link rel="icon" href="/themes/custom/proofpoint/apps/drupal/favicon.ico" /> <link rel="mask-icon" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon.svg" /> <link rel="icon" sizes="16x16" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-16x16.png" /> <link rel="icon" sizes="32x32" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-32x32.png" /> <link rel="icon" sizes="96x96" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-96x96.png" /> <link rel="icon" sizes="192x192" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-192x192.png" /> <link rel="apple-touch-icon" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-60x60.png" /> <link rel="apple-touch-icon" sizes="72x72" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-72x72.png" /> <link rel="apple-touch-icon" sizes="76x76" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-76x76.png" /> <link rel="apple-touch-icon" sizes="114x114" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-114x114.png" /> <link rel="apple-touch-icon" sizes="120x120" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-120x120.png" /> <link rel="apple-touch-icon" sizes="144x144" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-144x144.png" /> <link rel="apple-touch-icon" sizes="152x152" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-152x152.png" /> <link rel="apple-touch-icon" sizes="180x180" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-180x180.png" /> <link rel="apple-touch-icon-precomposed" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-57x57.png" /> <link rel="apple-touch-icon-precomposed" sizes="72x72" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-72x72.png" /> <link rel="apple-touch-icon-precomposed" sizes="76x76" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-76x76.png" /> <link rel="apple-touch-icon-precomposed" sizes="114x114" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-114x114.png" /> <link rel="apple-touch-icon-precomposed" sizes="120x120" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-120x120.png" /> <link rel="apple-touch-icon-precomposed" sizes="144x144" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-144x144.png" /> <link rel="apple-touch-icon-precomposed" sizes="152x152" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-152x152.png" /> <link rel="apple-touch-icon-precomposed" sizes="180x180" href="/themes/custom/proofpoint/apps/drupal/images/favicons/favicon-180x180.png" /> <meta property="og:site_name" content="Proofpoint" /> <meta property="og:type" content="website" /> <meta property="og:url" content="https://www.proofpoint.com/us/threat-reference/shadow-it" /> <meta property="og:title" content="What Is Shadow IT? - Meaning, Examples &amp; More | Proofpoint US" /> <meta property="og:description" content="Shadow IT occurs when users deploy cloud services within an organization without IT&#039;s knowledge. Read more on Shadow IT, the meaning, examples, and more." /> <meta property="og:image" content="" /> <meta property="og:image:url" content="" /> <meta property="og:image:secure_url" content="" /> <meta property="article:published_time" content="2021-02-26T16:53:27-08:00" /> <meta property="article:modified_time" content="2024-05-07T07:27:09-07:00" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:site" content="@proofpoint" /> <meta name="twitter:title" content="What Is Shadow IT? - Meaning, Examples &amp; More | Proofpoint US" /> <meta name="twitter:description" content="Shadow IT occurs when users deploy cloud services within an organization without IT&#039;s knowledge. Read more on Shadow IT, the meaning, examples, and more." /> <meta name="twitter:url" content="https://www.proofpoint.com/us/threat-reference/shadow-it" /> <meta name="twitter:image" content="" /> <link rel="alternate" hreflang="en-us" href="https://www.proofpoint.com/us/threat-reference/shadow-it" /> <script data-cfasync="false" type="text/javascript" id="vwoCode">window._vwo_code=window._vwo_code || (function() { var account_id=767242, version=1.3, settings_tolerance=2000, library_tolerance=2500,z use_existing_jquery=false, is_spa=1, hide_element='body', /* DO NOT EDIT BELOW THIS LINE */ f=false,d=document,code={use_existing_jquery:function(){return use_existing_jquery},library_tolerance:function(){return library_tolerance},finish:function(){if(!f){f=true;var e=d.getElementById('_vis_opt_path_hides');if(e)e.parentNode.removeChild(e)}},finished:function(){return f},load:function(e){var t=d.createElement('script');t.fetchPriority='high';t.src=e;t.type='text/javascript';t.innerText;t.onerror=function(){_vwo_code.finish()};d.getElementsByTagName('head')[0].appendChild(t)},init:function(){window.settings_timer=setTimeout(function(){_vwo_code.finish()},settings_tolerance);var e=d.createElement('style'),t=hide_element?hide_element+'{opacity:0 !important;filter:alpha(opacity=0) !important;background:none !important;}':'',i=d.getElementsByTagName('head')[0];e.setAttribute('id','_vis_opt_path_hides');e.setAttribute('nonce',document.querySelector('#vwoCode').nonce);e.setAttribute('type','text/css');if(e.styleSheet)e.styleSheet.cssText=t;else e.appendChild(d.createTextNode(t));i.appendChild(e);this.load('https://dev.visualwebsiteoptimizer.com/j.php?a='+account_id+'&u='+encodeURIComponent(d.URL)+'&f='+ +is_spa+'&vn='+version);return settings_timer}};window._vwo_settings_timer = code.init();return code;}());</script> <meta name="facebook-domain-verification" content="l349mr2tyecyl7w3a1146378lqxru1" /> <meta name="MobileOptimized" content="width" /> <meta name="HandheldFriendly" content="true" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/proofpoint.woff2" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/RobotoCondensed-Regular-webfont.woff" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/fjalla-one-v7-latin-regular.woff" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/fjalla-one-v7-latin-regular.woff2" as="font" crossorigin="anonymous" /> <link rel="preload" href="/themes/custom/proofpoint/dist/app-drupal/assets/fonts/RobotoCondensed-Bold-webfont.woff" as="font" crossorigin="anonymous" /> <link rel="alternate" hreflang="en-gb" href="https://www.proofpoint.com/uk/threat-reference/shadow-it" /> <link rel="alternate" hreflang="fr" href="https://www.proofpoint.com/fr/threat-reference/shadow-it" /> <link rel="alternate" hreflang="de" href="https://www.proofpoint.com/de/threat-reference/shadow-it" /> <link rel="alternate" hreflang="es" href="https://www.proofpoint.com/es/threat-reference/shadow-it" /> <link rel="alternate" hreflang="ja" href="https://www.proofpoint.com/jp/threat-reference/shadow-it" /> <link rel="alternate" hreflang="en-au" href="https://www.proofpoint.com/au/threat-reference/shadow-it" /> <link rel="alternate" hreflang="it" href="https://www.proofpoint.com/it/threat-reference/shadow-it" /> <title>What Is Shadow IT? - Meaning, Examples &amp; More | Proofpoint US</title> <link rel="stylesheet" media="all" href="/sites/default/files/css/css_5x1zduTS4IFCCOssa4IT2g5zuOu1aGbQfcPEEW3PgCM.css?delta=0&amp;language=en&amp;theme=particle&amp;include=eJx1kEtuwzAMRC8URSi66W0CSmZkITQpkFTQ3L5yUNTyoks-DjCf1m7144sjAZcOBcOCjtlFL63dNtAHusStc14flXdmCJrX2L2S7bevuGF0EUqgF3uZ4xYTGF4aqNdMGLMoTlJIDClVLoeiiBTCcBd2O-hdxFHD83MSkpiBvgLLcnJgR_bQRgM98IqwnHySDpK1b-ltA0WhrRYX7Q3oepBr59YTVVtxmVwcQgLm2WIESkABaVQ7hbcGeUqYSEqwnixrTRP_Q2Eo8uN4KJp0zWj_PUIdSx_Y8dtDFuobzxMqYnCtI2IDRpq3Ufltc1p432wghucPgKXPtA" /> <link rel="stylesheet" media="all" href="/sites/default/files/css/css_PQV9muH-rdaRVwc9lDDbqGqBuPnHsQmef8M8_O7sDXQ.css?delta=1&amp;language=en&amp;theme=particle&amp;include=eJx1kEtuwzAMRC8URSi66W0CSmZkITQpkFTQ3L5yUNTyoks-DjCf1m7144sjAZcOBcOCjtlFL63dNtAHusStc14flXdmCJrX2L2S7bevuGF0EUqgF3uZ4xYTGF4aqNdMGLMoTlJIDClVLoeiiBTCcBd2O-hdxFHD83MSkpiBvgLLcnJgR_bQRgM98IqwnHySDpK1b-ltA0WhrRYX7Q3oepBr59YTVVtxmVwcQgLm2WIESkABaVQ7hbcGeUqYSEqwnixrTRP_Q2Eo8uN4KJp0zWj_PUIdSx_Y8dtDFuobzxMqYnCtI2IDRpq3Ufltc1p432wghucPgKXPtA" /> <script src="/sites/default/files/js/js_Wi8RdyzDF-uwGcwq9eMv1Giiu7RfMo7nYneG5kg6rd4.js?scope=header&amp;delta=0&amp;language=en&amp;theme=particle&amp;include=eJx1kEtuwzAMRC8URSi66W0CSmZkITQpkFTQ3L5yUNTyoks-DjCf1m7144sjAZcOBcOCjtlFL63dNtAHusStc14flXdmCJrX2L2S7bevuGF0EUqgF3uZ4xYTGF4aqNdMGLMoTlJIDClVLoeiiBTCcBd2O-hdxFHD83MSkpiBvgLLcnJgR_bQRgM98IqwnHySDpK1b-ltA0WhrRYX7Q3oepBr59YTVVtxmVwcQgLm2WIESkABaVQ7hbcGeUqYSEqwnixrTRP_Q2Eo8uN4KJp0zWj_PUIdSx_Y8dtDFuobzxMqYnCtI2IDRpq3Ufltc1p432wghucPgKXPtA"></script> </head> <body class="path-node"> <a href="#main-content" class="visually-hidden focusable"> Skip to main content </a> <div class="limit-width-wrapper"> <div class="dialog-off-canvas-main-canvas" data-off-canvas-main-canvas> <div class="header-nav__spacer"></div> <div class="header-nav js-is-top"> <div class="header-nav__extra"> <div class="header-nav__extra-wrap"> <div class="header-nav__top-language" data-open="content:x_lng"> <span>English (Americas)</span> </div> <div class="header-nav__actions"> <div class="header-nav__top-search" data-open="content:x_sch"> <span>Search</span> </div> <div class="header-nav__top-login" data-open="content:x_lgn"> <span>Login</span> </div> </div> </div> </div> <div class="header-nav__main"> <div class="header-nav__main-wrap"> <div class="header-nav__expand" data-open="home"></div> <ul class="header-nav__top-links"> <li class="header-nav__top-link"> <div data-open="content:platform_panel" class="header-nav__top-link-text"> Platform </div> </li> <li class="header-nav__top-link"> <div data-open="content:products_panel" class="header-nav__top-link-text"> Products </div> </li> <li class="header-nav__top-link"> <div data-open="content:solutions_panel" class="header-nav__top-link-text"> Solutions </div> </li> </ul> <a href="/us" class="header-nav__logo">Proofpoint</a> <div class="header-nav__buttons"> <a href=/us/contact class="global-elements__cta-button--outline header-nav__button" > <span>Contact</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> <div class="header-nav__mobile-actions"> <div class="header-nav__mobile-search" data-open="content:x_sch">Search</div> <div class="header-nav__mobile-menu" data-open="home"></div> </div> </div> </div> </div> <div class="header-nav__menu"> <div class="header-nav__menu-wrapper"> <div class="header-nav__menu-close"></div> <div class="header-nav__menu-pane" data-home={true}> <ul class="header-nav__home-links"> <li class="header-nav__home-link" data-open="content:platform_panel" ><span>Platform</span></li> <li class="header-nav__home-link" data-open="content:products_panel" ><span>Products</span></li> <li class="header-nav__home-link" data-open="content:solutions_panel" ><span>Solutions</span></li> <li class="header-nav__home-link" data-open="content:partners_panel" ><span>Partners</span></li> <li class="header-nav__home-link" data-open="content:resources_panel" ><span>Resources</span></li> <li class="header-nav__home-link" data-open="content:company_panel" ><span>Company</span></li> </ul> <div class="header-nav__menu-extras"> <div class="header-nav__menu-search" data-open="content:x_sch">Search</div> <div class="header-nav__menu-login" data-open="content:x_lgn">Login</div> <div class="header-nav__menu-language" data-open="content:x_lng">English (Americas)</div> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Platform"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Platform</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Products"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Products</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Solutions"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Solutions</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Partners"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Partners</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Resources"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Resources</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-sublinks="Company"> <div class="header-nav__sublinks"> <div class="header-nav__expand-title">Company</div> <ul class="header-nav__expand-links"> </ul> </div> </div> <div class="header-nav__menu-pane" data-content="products_panel"> <div class="header-nav__content"> <a href="/us/products/protect-people" class="header-nav__content-link-group-anchor"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Protect People</div> <div class="header-nav__content-group-desc">Multi-layered, adaptive defenses for threat detection, impersonation, and supplier risk.</div> </div> </a> <div class="header-nav__content-link"> <a href="/us/products/threat-defense" class="header-nav__content-link-text">Email Security</a> </div> <div class="header-nav__content-link"> <a href="/us/products/impersonation-protection" class="header-nav__content-link-text">Impersonation Protection</a> </div> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:products_more_tp_products_panel">More products</a> </div> <a href="/us/products/defend-data" class="header-nav__content-link-group-anchor"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Defend Data</div> <div class="header-nav__content-group-desc">Transform your information protection with a human-centric, omni-channel approach.</div> </div> </a> <div class="header-nav__content-link"> <a href="/us/products/data-loss-prevention" class="header-nav__content-link-text">Enterprise DLP</a> </div> <div class="header-nav__content-link"> <a href="/us/products/adaptive-email-dlp" class="header-nav__content-link-text">Adaptive Email DLP</a> </div> <div class="header-nav__content-link"> <a href="/us/products/insider-threat-management" class="header-nav__content-link-text">Insider Threat Management</a> </div> <div class="header-nav__content-link"> <a href="/us/products/compliance-and-archiving" class="header-nav__content-link-text">Intelligent Compliance</a> </div> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Mitigate Human Risk</div> <div class="header-nav__content-group-desc">Unlock full user risk visibility and drive behavior change.</div> </div> <div class="header-nav__content-link"> <a href="/us/products/mitigate-human-risk" class="header-nav__content-link-text">Security Awareness</a> </div> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Augment Your Capabilities</div> </div> <div class="header-nav__content-link"> <a href="/us/products/premium-services" class="header-nav__content-link-text">Managed Services</a> </div> <div class="header-nav__content-link"> <a href="/us/products/packages" class="header-nav__content-link-text">Product Packages</a> </div> <div class="header-nav__content-link-spacer"></div> </div> </div> <div class="header-nav__menu-pane" data-content="products_more_tp_products_panel"> <div class="header-nav__content"> <div class="header-nav__content-heading">More Protect People Products</div> <div class="header-nav__content-link"> <a href="/us/products/identity-protection" class="header-nav__content-link-text">Account Take-Over and Identity Protection</a> <div class="header-nav__content-link-desc">Secure vulnerable identities, stop lateral movement and privilege escalation.</div> </div> <div class="header-nav__content-link"> <a href="/us/products/adaptive-email-security" class="header-nav__content-link-text">Adaptive Email Security</a> <div class="header-nav__content-link-desc">Stop more threats with a fully integrated layer of behavioral AI.</div> </div> <div class="header-nav__content-link"> <a href="/us/products/email-security-and-protection/secure-email-relay" class="header-nav__content-link-text">Secure Email Relay</a> <div class="header-nav__content-link-desc">Secure your application email and accelerate DMARC implementation</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="solutions_panel"> <div class="header-nav__content"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Solutions by Use Case</div> <div class="header-nav__content-group-desc">How Proofpoint protects your people and data.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/email-authentication-with-dmarc" class="header-nav__content-link-text">Authenticate Your Email</a> <div class="header-nav__content-link-desc">Protect your email deliverability with DMARC.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/combat-email-and-cloud-threats" class="header-nav__content-link-text">Combat Email and Cloud Threats</a> <div class="header-nav__content-link-desc">Protect your people from email and cloud threats with an intelligent and holistic approach.</div> </div> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:solutions_by_use_case_panel">More use cases</a> </div> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Solutions by Industry</div> <div class="header-nav__content-group-desc">People-centric solutions for your organization.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/federal" class="header-nav__content-link-text">Federal Government</a> <div class="header-nav__content-link-desc">Cybersecurity for federal government agencies.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/state-and-local-government" class="header-nav__content-link-text">State and Local Government</a> <div class="header-nav__content-link-desc">Protecting the public sector, and the public from cyber threats.</div> </div> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:solutions_by_industry_panel">More industries</a> </div> <a href="/us/compare" class="header-nav__content-link-group-anchor"> <div class="header-nav__content-link-group"> <div class="header-nav__content-group-title">Comparing Proofpoint</div> <div class="header-nav__content-group-desc">Evaluating cybersecurity vendors? Check out our side-by-side comparisons.</div> </div> </a> <div class="header-nav__content-link"> <a href="#" class="header-nav__content-link-text" data-open="content:compare_proofpoint_panel">View comparisons</a> </div> </div> </div> <div class="header-nav__menu-pane" data-content="solutions_by_use_case_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Solutions By Use Case</h3> <div class="header-nav__content-heading">How Proofpoint protects your people and data.</div> <div class="header-nav__content-link"> <a href="/us/solutions/change-user-behavior" class="header-nav__content-link-text">Change User Behavior</a> <div class="header-nav__content-link-desc">Help your employees identify, resist and report attacks before the damage is done.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/combat-data-loss-and-insider-risk" class="header-nav__content-link-text">Combat Data Loss and Insider Risk</a> <div class="header-nav__content-link-desc">Prevent data loss via negligent, compromised and malicious insiders.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/enable-intelligent-compliance" class="header-nav__content-link-text">Modernize Compliance and Archiving</a> <div class="header-nav__content-link-desc">Manage risk and data retention needs with a modern compliance and archiving solution.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/protect-cloud-apps" class="header-nav__content-link-text">Protect Cloud Apps</a> <div class="header-nav__content-link-desc">Keep your people and their cloud apps secure by eliminating threats and data loss.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/prevent-loss-from-ransomware" class="header-nav__content-link-text">Prevent Loss from Ransomware</a> <div class="header-nav__content-link-desc">Learn about this growing threat and stop attacks by securing ransomware&#039;s top vector: email.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/secure-microsoft-365" class="header-nav__content-link-text">Secure Microsoft 365</a> <div class="header-nav__content-link-desc">Implement the best security and compliance solution for Microsoft 365.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="solutions_by_industry_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Solutions By Industry</h3> <div class="header-nav__content-heading">People-centric solutions for your organization.</div> <div class="header-nav__content-link"> <a href="/us/solutions/higher-education-security" class="header-nav__content-link-text">Higher Education</a> <div class="header-nav__content-link-desc">A higher level of security for higher education.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/financial-services-and-insurance" class="header-nav__content-link-text">Financial Services</a> <div class="header-nav__content-link-desc">Eliminate threats, build trust and foster growth for your organization.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/healthcare-information-security" class="header-nav__content-link-text">Healthcare</a> <div class="header-nav__content-link-desc">Protect clinicians, patient data, and your intellectual property against advanced threats.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/mobile-message-security-solutions-for-service-providers" class="header-nav__content-link-text">Mobile Operators</a> <div class="header-nav__content-link-desc">Make your messaging environment a secure environment.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/email-security-solutions-for-service-providers" class="header-nav__content-link-text">Internet Service Providers</a> <div class="header-nav__content-link-desc">Cloudmark email protection.</div> </div> <div class="header-nav__content-link"> <a href="/us/solutions/protection-compliance-small-business" class="header-nav__content-link-text">Small and Medium Businesses</a> <div class="header-nav__content-link-desc">Big-time security for small business.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="compare_proofpoint_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Proofpoint vs. the competition</h3> <div class="header-nav__content-heading">Side-by-side comparisons.</div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-abnormal-security" class="header-nav__content-link-text">Proofpoint vs. Abnormal Security</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-mimecast" class="header-nav__content-link-text">Proofpoint vs. Mimecast</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-cisco" class="header-nav__content-link-text">Proofpoint vs. Cisco</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-microsoft" class="header-nav__content-link-text">Proofpoint vs Microsoft</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-microsoft-purview" class="header-nav__content-link-text">Proofpoint vs. Microsoft Purview</a> </div> <div class="header-nav__content-link"> <a href="/us/compare/proofpoint-vs-legacy-dlp" class="header-nav__content-link-text">Proofpoint vs. Legacy DLP</a> </div> </div> </div> <div class="header-nav__menu-pane" data-content="partners_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Partners</h3> <div class="header-nav__content-heading">Deliver Proofpoint solutions to your customers.</div> <a href=https://partners.proofpoint.com class="global-elements__cta-button header-nav__content-button" > <span>Channel Partners</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/us/partners/trusted-data-solutions-partnership" class="header-nav__content-link-text">Archive Extraction Partners</a> <div class="header-nav__content-link-desc">Learn about Extraction Partners.</div> </div> <div class="header-nav__content-link"> <a href="/us/global-system-integrator-gsi-and-global-managed-service-provider-msp-partners" class="header-nav__content-link-text">GSI and MSP Partners</a> <div class="header-nav__content-link-desc">Learn about our global consulting.</div> </div> <div class="header-nav__content-link"> <a href="/us/partners/technology-alliance-partners" class="header-nav__content-link-text">Technology and Alliance Partners</a> <div class="header-nav__content-link-desc">Learn about our relationships.</div> </div> <div class="header-nav__content-link"> <a href="/us/partners/digital-risk-and-compliance-partners" class="header-nav__content-link-text">Social Media Protection Partners</a> <div class="header-nav__content-link-desc">Learn about the technology and....</div> </div> <div class="header-nav__content-link"> <a href="/us/channel-partners-small-and-medium-business" class="header-nav__content-link-text">Proofpoint Essentials Partner Programs</a> <div class="header-nav__content-link-desc">Small Business Solutions .</div> </div> <div class="header-nav__content-link"> <a href="https://partners.proofpoint.com/prm/English/s/applicant" class="header-nav__content-link-text">Become a Channel Partner</a> </div> </div> </div> <div class="header-nav__menu-pane" data-content="resources_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Resources</h3> <div class="header-nav__content-heading">Find reports, webinars, blogs, events, podcasts and more.</div> <a href=/us/resources class="global-elements__cta-button header-nav__content-button" > <span>Resource Library</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/us/blog" class="header-nav__content-link-text">Blog</a> <div class="header-nav__content-link-desc">Keep up with the latest news and happenings.</div> </div> <div class="header-nav__content-link"> <a href="/us/webinars" class="header-nav__content-link-text">Webinars</a> <div class="header-nav__content-link-desc">Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity.</div> </div> <div class="header-nav__content-link"> <a href="/us/cybersecurity-academy" class="header-nav__content-link-text">Cybersecurity Academy</a> <div class="header-nav__content-link-desc">Earn your certification to become a Proofpoint Certified Guardian.</div> </div> <div class="header-nav__content-link"> <a href="/us/podcasts" class="header-nav__content-link-text">Podcasts</a> <div class="header-nav__content-link-desc">Learn about the human side of cybersecurity.</div> </div> <div class="header-nav__content-link"> <a href="/us/new-perimeters" class="header-nav__content-link-text">New Perimeters Magazine</a> <div class="header-nav__content-link-desc">Get the latest cybersecurity insights in your hands.</div> </div> <div class="header-nav__content-link"> <a href="/us/threat-reference" class="header-nav__content-link-text">Threat Glossary</a> <div class="header-nav__content-link-desc">Learn about the latest security threats.</div> </div> <div class="header-nav__content-link"> <a href="/us/events" class="header-nav__content-link-text">Events</a> <div class="header-nav__content-link-desc">Connect with us at events to learn how to protect your people and data from ever-evolving threats.</div> </div> <div class="header-nav__content-link"> <a href="/us/customer-stories" class="header-nav__content-link-text">Customer Stories</a> <div class="header-nav__content-link-desc">Read how our customers solve their most pressing cybersecurity challenges.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="company_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Company</h3> <div class="header-nav__content-heading">Proofpoint protects organizations' greatest assets and biggest risks: their people.</div> <a href=/us/company/about class="global-elements__cta-button header-nav__content-button" > <span>About Proofpoint</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/us/why-proofpoint" class="header-nav__content-link-text">Why Proofpoint</a> <div class="header-nav__content-link-desc">Learn about our unique people-centric approach to protection.</div> </div> <div class="header-nav__content-link"> <a href="/us/company/careers" class="header-nav__content-link-text">Careers</a> <div class="header-nav__content-link-desc">Stand out and make a difference at one of the world&#039;s leading cybersecurity companies.</div> </div> <div class="header-nav__content-link"> <a href="/us/newsroom" class="header-nav__content-link-text">News Center</a> <div class="header-nav__content-link-desc">Read the latest press releases, news stories and media highlights about Proofpoint.</div> </div> <div class="header-nav__content-link"> <a href="/us/legal/trust" class="header-nav__content-link-text">Privacy and Trust</a> <div class="header-nav__content-link-desc">Learn about how we handle data and make commitments to privacy and other regulations.</div> </div> <div class="header-nav__content-link"> <a href="/us/legal/esg" class="header-nav__content-link-text">Environmental, Social, and Governance</a> <div class="header-nav__content-link-desc">Learn how we apply our principles to positively impact our community.</div> </div> <div class="header-nav__content-link"> <a href="/us/support-services" class="header-nav__content-link-text">Support</a> <div class="header-nav__content-link-desc">Access the full range of Proofpoint support services.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="platform_panel"> <div class="header-nav__content"> <h3 class="header-nav__content-title">Platform</h3> <div class="header-nav__content-heading">Discover the Proofpoint human-centric platform.</div> <a href=/us/platform class="global-elements__cta-button header-nav__content-button" > <span>Learn More</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <div class="header-nav__content-link"> <a href="/us/platform/nexus" class="header-nav__content-link-text">Proofpoint Nexus</a> <div class="header-nav__content-link-desc">Detection technologies to protect people and defend data.</div> </div> <div class="header-nav__content-link"> <a href="/us/platform/zen" class="header-nav__content-link-text">Proofpoint Zen</a> <div class="header-nav__content-link-desc">Protect and engage users wherever they work.</div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="x_sch"> <div class="header-nav__content"> <div class="header-nav__content-title--search"> Search Proofpoint </div> <div class="header-nav__search"> <form class="header-nav__search-form"> <input type="text" class="header-nav__search-input" placeholder=""> <input type="submit" class="header-nav__search-button" val="Search"> </form> <div class="header-nav__search-sugg-title">Try searching for</div> <div class="header-nav__search-suggestions"> <a href="/us/search?content%5Bquery%5D=Email%20Security" class="header-nav__search-suggestion">Email Security</a> <a href="/us/search?content%5Bquery%5D=Phishing" class="header-nav__search-suggestion">Phishing</a> <a href="/us/search?content%5Bquery%5D=DLP" class="header-nav__search-suggestion">DLP</a> <a href="/us/search?content%5Bquery%5D=Email%20Fraud" class="header-nav__search-suggestion">Email Fraud</a> </div> </div> </div> </div> <div class="header-nav__menu-pane" data-content="x_lgn"> <div class="header-nav__content"> <div class="header-nav__content-title"> Select Product Login </div> <ul class="header-nav__logins"> <li class="header-nav__content-login"> <a href="https://proofpoint.my.site.com/community/s/" target="_blank">Support Log-in</a> </li> <li class="header-nav__content-login"> <a href="https://proofpointcybersecurityacademy.adobelearningmanager.com" target="_blank">Proofpoint Cybersecurity Academy</a> </li> <li class="header-nav__content-login"> <a href="https://digitalrisk.proofpoint.com/" target="_blank">Digital Risk Portal</a> </li> <li class="header-nav__content-login"> <a href="https://emaildefense.proofpoint.com/login.php" target="_blank">Email Fraud Defense</a> </li> <li class="header-nav__content-login"> <a href="https://threatintel.proofpoint.com/" target="_blank">ET Intelligence</a> </li> <li class="header-nav__content-login"> <a href="https://us1.proofpointessentials.com/app/login.php" target="_blank">Proofpoint Essentials</a> </li> <li class="header-nav__content-login"> <a href="https://proofpointcommunities.force.com/community" target="_blank">Sendmail Support Log-in</a> </li> </ul> </div> </div> <div class="header-nav__menu-pane" data-content="x_lng"> <div class="header-nav__content"> <div class="header-nav__content-title"> Select Language </div> <ul class="header-nav__language-links"> <li class="header-nav__language-link"> <a href="/us">English (Americas)</a> </li> <li class="header-nav__language-link"> <a href="/uk">English (Europe, Middle East, Africa)</a> </li> <li class="header-nav__language-link"> <a href="/au">English (Asia-Pacific)</a> </li> <li class="header-nav__language-link"> <a href="/es">Español</a> </li> <li class="header-nav__language-link"> <a href="/de">Deutsch</a> </li> <li class="header-nav__language-link"> <a href="/fr">Français</a> </li> <li class="header-nav__language-link"> <a href="/it">Italiano</a> </li> <li class="header-nav__language-link"> <a href="/br">Português</a> </li> <li class="header-nav__language-link"> <a href="/jp">日本語</a> </li> <li class="header-nav__language-link"> <a href="/kr">한국어</a> </li> </ul> </div> </div> </div> </div> <div class="layout-container"> <div> <div data-drupal-messages-fallback class="hidden"></div> </div> <main class="container" role="main"> <a id="main-content" tabindex="-1"></a> <section class="row"> <div class="layout-content"> <div> <div id="block-particle-content"> <article about="/us/threat-reference/shadow-it" class="node--type--glossary node--view-mode--full node node-glossary-full"> <script type="application/ld+json"> { "@context": "https://schema.org/", "@type": "DefinedTerm", "name": "Shadow IT", "description": "What Is Shadow IT? Examples of Shadow IT Types of Shadow IT Managing Shadow IT Shadow IT Risks &amp;amp; Issues Are There Benefits of Shadow IT? Shadow IT Threats Why Is Shadow IT Increasing? How Proofpoint Can Help", "url": "https://www.proofpoint.com/us/threat-reference/shadow-it", "inDefinedTermSet": "https://www.proofpoint.com/us/threat-reference" } </script> <div class="glossary-content__breadcrumbs"> <div class="breadcrumbs"><div class="nav-crumbs"><div class="breadcrumb__item"><a href="/us/threat-reference" class="breadcrum__item-link">Glossary</a></div><div class="breadcrumb__item"> Shadow IT </div></div></div> </div> <div class="glossary-content__hero"> <div class="paragraph paragraph--type--hero-banner-v3 paragraph--view-mode--default hero-banner-v3" style="background-image: url(&quot;/sites/default/files/styles/webp_conversion/public/general-banners/pfpt-placeholder-banner-2022.png.webp?itok=E050rqaL&quot;)"> <div class="hero-banner-v3__wrapper hero-banner-v3__wrapper-default"> <h1 class="hero-banner-v3__title"> Shadow IT </h1> <a href=/us/resources/e-books/getting-started-with-casb class="global-elements__cta-button--white" target="" > <span>Get Started with CASB</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> <a href=/us/resources/webinars/cost-cloud-compromise-and-shadow-it class="global-elements__cta-button" target="" > <span>Watch the Cost of Cloud Compromise & Shadow IT webinar</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> </div> <div class="glossary-content"> <h3 class="glossary-content__headline"> Table of Contents </h3> <div class="node-full__body glossary-content__body"> <div style="display: flex; flex-wrap: wrap;"> <div style="width: 400px;"> <ul style="margin: 0;"> <li><a href="#toc-1">What Is Shadow IT?</a></li> <li><a href="#toc-2">Examples of Shadow IT</a></li> <li><a href="#toc-3">Types of Shadow IT</a></li> <li><a href="#toc-4">Managing Shadow IT</a></li> <li><a href="#toc-5">Shadow IT Risks &amp; Issues</a></li> </ul> </div> <div style="width: 400px;"> <ul style="margin: 0;"> <li><a href="#toc-6">Are There Benefits of Shadow IT?</a></li> <li><a href="#toc-7">Shadow IT Threats</a></li> <li><a href="#toc-8">Why Is Shadow IT Increasing?</a></li> <li><a href="#toc-9">How Proofpoint Can Help</a></li> </ul> </div> </div> </div> </div> <div class="glossary__components"> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <div class="block-text-cols__body"> <p>Shadow IT poses significant challenges for organizations and their IT departments. It requires a strategic approach to address the security and compliance risks that come with shadow IT, all while balancing the need to empower employees with the appropriate tools and technologies.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <div class="paragraph paragraph--type--free-trial-panel paragraph--view-mode--full free-trial-panel free-trial-panel--black v3-dark-bg-only free-trial-panel--no-img"> <div class="free-trial-panel__wrapper"> <div class="free-trial-panel__content"> <div class="free-trial-panel__heading"> <h3>Cybersecurity Education and Training Begins Here</h3> </div> <a href=# class="global-elements__cta-button--white free-trial-panel__action-btn" > <span>Start a Free Trial</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> <div class="free-trial-panel-form"> <div class="paragraph paragraph--type--marketo-form paragraph--view-mode--default marketo-form UNCONVERTED"> <div class="marketo-form__content"> <h2>Here’s how your free trial works:</h2> <ul> <li>Meet with our cybersecurity experts to assess your environment and identify your threat risk exposure</li> <li>Within 24 hours and minimal configuration, we’ll deploy our solutions for 30 days</li> <li>Experience our technology in action!</li> <li>Receive report outlining your security vulnerabilities to help you take immediate action against cybersecurity attacks</li> </ul> <p>Fill out this form to request a meeting with our cybersecurity experts.</p> </div> <div class="marketo-form__form-container"> <div class="mk-form"> <div class="mk-form__form-container"> <script type="IN/Form2" data-data-form="mktoForm_3331" data-field-firstname="FirstName" data-field-lastname="LastName" data-field-email="Email" data-field-company="Company" data-field-title="Title" data-field-state="State" data-field-country="Country" ></script> <form id="mktoForm_3331" data-mkto-id="3331" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1" class="mk-form__form marketo-form-block__form" ></form> </div> </div> <div class="mk-form__success"> <p>Thank you for your submission.</p> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__lg"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-1"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">What Is Shadow IT?</h3> <div class="block-text-cols__body"> <p>Shadow IT refers to the use of hardware, software, or cloud-based services in an organization without the knowledge or approval of the central IT department. This typically happens when employees use unsanctioned applications, devices, or cloud services to perform their work more efficiently or conveniently without going through the official IT procurement and approval processes.</p> <p>Shadow IT includes using personal devices, file-sharing tools, messaging apps, productivity software, and other cloud-based services that the organization’s IT team does not manage or support.</p> <p>The rise of cloud computing and the consumerization of IT have contributed to the proliferation of shadow IT, as employees have easier access to a wide range of self-service technologies to meet their specific needs. While shadow IT can boost employee productivity and innovation, it also introduces significant security and compliance risks for the organization, as unsanctioned technologies may not be subject to the same security measures and controls as approved IT systems.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-2"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Examples of Shadow IT</h3> <div class="block-text-cols__body"> <p>Shadow IT can manifest in a variety of ways in an organization, as employees seek out unsanctioned technologies to improve their productivity and efficiency. Some common examples of shadow IT include:</p> <h4>Unauthorized Cloud Applications and Services</h4> <p>Employees may use personal accounts for cloud-based productivity, collaboration, or file-sharing tools, such as Slack, Trello, Dropbox, or Google Drive, without the knowledge or approval of the IT department. That means sensitive corporate data may be stored and shared outside the organization’s secure environment.</p> <h4>Bring-Your-Own-Device (BYOD) Practices</h4> <p>Employees may use their personal laptops, tablets, smartphones, or other devices to access corporate resources and perform work-related tasks, bypassing the organization’s device management and security policies. This can introduce vulnerabilities and make it more difficult for the IT team to maintain control over the technology landscape.</p> <h4>Unauthorized Software Installations</h4> <p>Workers may install unapproved software, such as messaging apps (e.g., WhatsApp, Skype), generative AI tools, or other productivity applications, on their corporate-issued or personal devices to streamline their workflows. These unsanctioned applications may not be subject to the same security controls and patch management processes as the organization’s approved software.</p> <h4>Rogue IT Projects</h4> <p>In some cases, employees or even entire departments may initiate their own IT projects or acquire new technologies without the knowledge or approval of the IT team. This can lead to deploying systems or applications that are not integrated with the organization’s existing infrastructure, creating operational inefficiencies and security risks.</p> <h4>Unauthorized Data Storage and Sharing</h4> <p>Employees may use personal email accounts, USB drives, or other unsanctioned file-sharing methods to store and transmit corporate data, bypassing the organization’s data governance and security policies. This can result in losing control over sensitive information and increase the risk of data breaches or compliance violations.</p> <p>Shadow IT can emerge within an organization in diverse ways, often driven by employees’ desire to improve their productivity and efficiency. However, using these unsanctioned technologies can expose the organization to significant security, compliance, and operational risks that must be addressed through a comprehensive shadow IT management strategy.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-3"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Types of Shadow IT</h3> <div class="block-text-cols__body"> <p>Several common types of shadow IT can emerge in organizations:</p> <ul> <li><strong>SaaS applications:</strong> The implementation of cloud-based software-as-a-service (SaaS) applications, such as productivity tools, collaboration platforms, or file-sharing services, without the knowledge or approval of the IT team. These unsanctioned SaaS apps may lack proper access controls, security measures, and data governance policies.</li> <li><strong>Personal devices and email accounts:</strong> Using personal laptops, tablets, smartphones, or email accounts to access, store, or share corporate data, which bypasses the organization’s security policies and controls. This can lead to data leaks and compliance issues.</li> <li><strong>Virtual machines:</strong> Employees create and use virtual machines on their desktops, servers, or in the cloud without the IT department’s knowledge or oversight. This can lead to vulnerabilities, default accounts, and poor configuration hygiene.</li> <li><strong>Shadow IoT devices:</strong> This includes smart, connected devices like fitness trackers, cameras, printers, and even some medical devices that employees bring into the workplace without the knowledge or approval of the IT department. These devices can introduce vulnerabilities and provide potential pathways for threat actors to access the corporate network.</li> <li><strong>Rogue network subnets:</strong> The addition of new network subnets, often due to office expansions or company acquisitions, that are not properly managed or integrated into the organization’s overall network infrastructure. These “shadow” subnets can create blind spots and security risks.</li> <li><strong>Unauthorized network hardware:</strong> Employees connect devices like consumer-grade <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="c5cb7c57-b397-4c06-9c9d-124b64d1d549" href="/us/threat-reference/wifi" title="Wi-Fi">Wi-Fi</a> access points, printers, cameras, or other hardware to the corporate network without the IT team’s knowledge or approval. These unmanaged devices can expose the organization to potential vulnerabilities and security breaches.</li> </ul> <p>By understanding the various types of shadow IT, organizations can develop more targeted strategies to identify, manage, and mitigate the associated risks.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-4"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Managing Shadow IT</h3> <div class="block-text-cols__body"> <p>Now, let’s consider best practices to effectively manage shadow IT and mitigate its risks.</p> <h4>Gain Visibility</h4> <p>The first step is to gain visibility into the organization’s shadow IT landscape. Specialized tools can continuously monitor the network and cloud environments to identify unsanctioned applications, devices, and services. By having a comprehensive inventory of shadow IT assets, organizations can better understand the scope of the problem and prioritize their mitigation efforts.</p> <h4>Establish Clear Policies and Guidelines</h4> <p>Organizations should develop and communicate clear policies and guidelines around the use of technology in the workplace. These policies should outline the approved software, hardware, and cloud services that employees can use, as well as the process for requesting and obtaining approval for new technologies.</p> <h4>Empower Employees with Approved Tools</h4> <p>To reduce the need for employees to turn to shadow IT, organizations should ensure that they have access to a comprehensive suite of approved and supported tools that meet their productivity and collaboration needs. By proactively providing employees with the right tools and resources, organizations can minimize the incentive for them to seek out unsanctioned alternatives.</p> <h4>Implement Security Controls</h4> <p>Organizations should implement robust security controls, such as multi-factor authentication, encryption, and access management, to secure both sanctioned and unsanctioned technologies. Additionally, they should ensure that all devices and applications are properly patched and updated to mitigate known vulnerabilities.</p> <h4>Educate and Train Employees</h4> <p>Ongoing employee education and <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="c932da4d-9d01-49db-9ca2-3b4f646dd7a7" href="/us/threat-reference/security-awareness-training" title="Security Awareness Training">security awareness training</a> are crucial for managing shadow IT. Employees should be made aware of the potential risks associated with shadow IT, as well as the approved processes for requesting and using new technologies. Regular security awareness training can also help employees recognize and avoid potential threats, such as <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="3d41a44d-bc21-401b-8912-4f84e4e683ce" href="/us/threat-reference/phishing" title="Phishing">phishing attacks</a> or data breaches.</p> <h4>Collaborate with Employees</h4> <p>Rather than taking a heavy-handed approach, organizations should work collaboratively with employees to understand their technology needs and find approved solutions that meet their requirements. A collaborative approach can help foster a culture of trust and transparency, where employees feel empowered to work with the IT department to address their technology needs.</p> <p>By implementing these best practices, organizations can gain more control over shadow IT activity, mitigate the associated risks, and empower their employees to work more efficiently and securely.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-5"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Shadow IT Risks & Issues</h3> <div class="block-text-cols__body"> <p>The proliferation of shadow IT in organizations can introduce a range of significant risks and issues that should be addressed.</p> <h4>Security Risks</h4> <p>Using unsanctioned applications and devices outside the control of the IT department can create significant security vulnerabilities. These unauthorized technologies may not have the same security controls, <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="60295b13-2f96-455d-ac54-ea0c31fea211" href="/us/threat-reference/encryption" title="Encryption">encryption</a>, or access management protocols as approved corporate systems, exposing the organization to potential data breaches, malware infections, and other cyber threats. Without visibility into the shadow IT landscape, the organization’s attack surface expands, making detecting and responding to security incidents more difficult.</p> <h4>Compliance Violations</h4> <p>Many industries are subject to strict regulatory requirements for handling and storing sensitive data. When employees use unapproved applications and cloud services to store or share corporate data, the organization may be at risk of non-compliance with relevant laws and regulations, such as <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="afe2dee8-4d87-47e7-aa3c-63ca24230fda" href="/us/threat-reference/hipaa-compliance" title="HIPAA Compliance">HIPAA</a>, GDPR, or <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="1bc74151-aebb-45eb-9c84-a6635d66b4a8" href="/us/threat-reference/pci-dss" title="PCI DSS">PCI-DSS</a>. The use of shadow IT can lead to costly fines, legal penalties, and reputational damage if the organization violates these compliance standards.</p> <h4>Data Governance</h4> <p>Shadow IT can result in losing control over corporate data, as employees may store sensitive information on personal devices or in unsanctioned cloud storage solutions. This makes it challenging for the organization to maintain proper <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="f7a3a7eb-326e-41d8-85e4-403623b4614e" href="/us/threat-reference/data-governance" title="Data Governance">data governance</a>, backup, and <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="2f834742-16ff-44d8-82e6-071e04088162" href="/us/threat-reference/disaster-recovery" title="Disaster Recovery">disaster recovery</a> procedures, potentially leading to data loss or leakage. Additionally, the use of multiple, uncoordinated applications can create “data silos,” making it difficult to obtain a comprehensive view of the organization’s information assets.</p> <h4>Control Issues</h4> <p>Many workers deploy cloud apps in the corporate environment with the best of intentions. They’ve discovered an app that works great, and they use it and share it with colleagues. But IT hasn’t approved it because they don’t know about it.</p> <p>The IT team might think they have 20 or 30 shadow apps on their network, which might be manageable. But when they run a Shadow IT discovery check, they’re shocked to find 1,300 such applications they had no idea were there. The more unknown apps on the network, the greater the risk from shadow IT. And you can’t secure what you don’t know about.</p> <h4>Operational Inefficiencies</h4> <p>The proliferation of shadow IT can lead to “app sprawl,” where different departments or individuals unknowingly acquire duplicate or overlapping software solutions. The result is wasted time, money, and resources as the organization struggles to manage and maintain these disparate systems. Additionally, the lack of integration between shadow IT applications and approved corporate systems can hinder collaboration and productivity.</p> <h4>Talent Management Challenges</h4> <p>When employees use unsanctioned technologies, it can create difficulties in managing and supporting the organization’s technology landscape. IT teams may struggle to provide adequate support and training for these unauthorized applications. Losing an employee responsible for a shadow IT solution can leave the organization with a knowledge gap and operational disruptions.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-6"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Are There Benefits of Shadow IT?</h3> <div class="block-text-cols__body"> <p>While shadow IT poses significant risks to organizations, there are also potential benefits that should be considered:</p> <ul> <li>Increased employee productivity and efficiency by allowing the use of preferred tools and applications.</li> <li>Reduced IT costs by leveraging free or low-cost cloud-based services without central IT involvement.</li> <li>Empowerment of employees to innovate and find creative solutions to their work challenges.</li> <li>Optimization of limited IT resources by allowing employees to self-provision basic services.</li> <li>Improved communication and collaboration through the use of cloud-based tools.</li> </ul> <p>While these benefits can be compelling, organizations must carefully weigh them against the significant security, compliance, and operational risks associated with shadow IT. A comprehensive shadow IT management strategy is necessary to strike the right balance between empowering employees and maintaining control over the technology landscape.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-7"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Shadow IT Threats</h3> <div class="block-text-cols__body"> <p>In today’s cloud-first world, governing your users’ access to both IT-authorized and unauthorized apps (Shadow IT) has never been more important. The average enterprise has an estimated 1,000 cloud apps in use. And some of these have serious security gaps that can potentially put organizations at risk and violate compliance regulations and mandates. The widespread use of shadow IT poses many cybersecurity threats:</p> <ul> <li>Expanded <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="d2279d29-6c16-4f7d-ae90-09fff010d8b8" href="/us/threat-reference/attack-surface" title="Attack Surface">attack surface</a> and reduced visibility into the organization’s IT environment, making it easier for cybercriminals to exploit vulnerabilities and gain unauthorized access.</li> <li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="089fd102-4c13-4972-ae00-d80e9b78ad6f" href="/us/threat-reference/data-breach" title="Data Breach">Data breaches</a> and leaks of sensitive corporate data, such as <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="64bc830b-f23a-49c5-9b50-731686670af5" href="/us/threat-reference/personal-identifiable-information" title="Personal Identifiable Information">personally identifiable information (PII)</a>, financial records, or <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="b044cc6a-5f5b-4027-9598-90f6914cf7dc" href="/us/threat-reference/intellectual-property-theft" title="Intellectual Property Theft">intellectual property</a>, due to the use of unsecured cloud-based applications and file-sharing tools.</li> <li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="5312929a-c85d-4291-a361-e34378e7fdff" href="/us/threat-reference/malware" title="Malware">Malware infections</a> and the potential spread of cyber threats throughout the organization’s network, as unsanctioned devices and applications may not be subject to the same security protocols and antivirus protections as approved IT systems.</li> <li>Credential theft and unauthorized access to corporate systems and resources due to employees storing login credentials for shadow IT applications in unsecured locations.</li> <li><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="dc00abb4-0611-4d1e-9b06-66929590f24f" href="/us/threat-reference/insider-threat" title="Insider Threat">Insider threats</a> and the potential for <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="0259daf0-b395-4306-b855-0473d62dfd3e" href="/us/threat-reference/data-exfiltration" title="Data Exfiltration">data exfiltration</a>, as disgruntled or careless employees may use shadow IT to bypass security controls and steal sensitive information.</li> <li>Operational disruptions and loss of productivity due to the use of unsupported technologies, as the IT department may struggle to provide adequate support and maintenance for these unauthorized applications.</li> </ul> <p>A common shadow IT is when a user grants broad OAuth permissions to third-party apps. This inadvertently violates data residency regulations, such as <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="03c62b07-e2e1-49a5-860b-6454ed897f9d" href="/us/threat-reference/gdpr" title="GDPR">GDPR</a>. In addition, attackers often use third-party add-ons and <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="4d1cd792-cfe7-4903-8091-18e49f4e61c3" href="/us/threat-reference/social-engineering" title="Social Engineering">social engineering</a> to trick people into granting broad access to your approved SaaS apps—such as Office 365, G Suite, and Box—that typically contain sensitive data.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-8"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">Why Is Shadow IT Increasing?</h3> <div class="block-text-cols__body"> <p>Several key trends and statistics indicate that shadow IT is rising within organizations. Below are some of the most compelling reasons why shadow IT is increasing.</p> <ul> <li><strong>Shift to remote and hybrid work:</strong> The global shift to remote and hybrid work models during the COVID-19 pandemic has been a major driver of the increase in shadow IT. As employees work from home, they have sought out new cloud-based tools and applications to maintain productivity and collaboration, often without the knowledge or approval of the IT department.</li> <li><strong>65% of experienced remote workers use shadow IT:</strong> <a href="https://www.beezy.net/2023-workplace-report" rel="noopener" target="_blank">Data shows</a> that 65% of employees already working remotely before the pandemic are currently using some form of shadow IT, compared to only 31% working remotely after the pandemic. This suggests that the more comfortable employees become with remote work, the more likely they are to adopt unsanctioned technologies.</li> <li><strong>Accelerated digital transformation:</strong> The need for rapid digital transformation to support remote work and online business operations has led many organizations to quickly adopt new cloud-based tools and services. However, this has often outpaced the ability of IT teams to properly vet and approve these technologies, resulting in the proliferation of shadow IT.</li> <li><strong>97% of cloud apps used in the average enterprise are shadow IT:</strong> <a href="https://www.netskope.com/lp-cloud-and-threat-report-july-2021-edition-web" rel="noopener" target="_blank">Research by Netskope</a> found a staggering 97% of cloud applications used within the average enterprise are considered shadow IT—not approved by the central IT department. This highlights the scale of the shadow IT challenge facing many organizations.</li> <li><strong>Desire for productivity and efficiency:</strong> Employees often turn to shadow IT solutions because they perceive them as more user-friendly, efficient, or better suited to their specific needs than the approved corporate tools.</li> <li><strong>60% of office workers use shadow IT because it’s easier than dealing with IT:</strong> <a href="https://gitnux.org/shadow-it-statistics/" rel="noopener" target="_blank">Statistics show</a> that around 60% of office workers use shadow IT because they find it easier than working with their company’s IT team. This suggests that the perceived friction or bureaucracy associated with the IT department can be a significant factor in the rise of shadow IT.</li> </ul> <p>These findings underscore a mounting need for organizations to better address the underlying drivers of shadow IT and develop more effective strategies to manage and mitigate the associated risks.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <span data-smooth-scroll="true" class="anchor_link" id="toc-9"></span> <div class="paragraph paragraph--type--text-columns paragraph--view-mode--full text-cols"> <div class="block-text-cols__cols block-text-cols__cols-1"> <div class="paragraph paragraph--type--text-column paragraph--view-mode--default block-text-cols__cols__item"> <h3 class="block-text-cols__title">How Proofpoint Can Help</h3> <div class="block-text-cols__body"> <p>From data breaches and malware infections to compliance violations and operational disruptions, the prevalence of unsanctioned applications and devices can leave corporate assets vulnerable to a wide range of cyber threats. To effectively mitigate these shadow IT risks, organizations should consider implementing comprehensive solutions like those offered by Proofpoint.</p> <p>Proofpoint’s <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="3147ad45-bef6-4688-89a4-f35aa0223721" href="/us/products/identity-threat-detection-response/shadow" title="Proofpoint Shadow"><strong>Shadow solution</strong></a> transforms endpoints into a “web of deceptions,” making it difficult for attackers to move laterally within the network and gain access to critical assets. By using over 75 active deception techniques, Shadow can imitate credentials, connections, data, and other artifacts that appear valuable to threat actors, allowing security teams to detect and track their activities. Additionally, Proofpoint’s <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="911fc813-d681-444f-af3c-dc2e24366520" href="/us/resources/solution-briefs/identity-threat-defense-platform" title="Proofpoint Identity Threat Defense platform">Identity Threat Defense Platform</a> provides end-to-end protection against identity-based threats, helping organizations discover and remediate vulnerable identities, as well as detect and respond to active threats.</p> <p>Proofpoint’s <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="d01f5454-eb6a-4dbc-b8f3-238b31e6d88f" href="/us/products/cloud-security/cloud-app-security-broker" title="Cloud App Security Broker"><strong>CASB solution</strong></a> can further help govern the use of shadow IT cloud apps and services by offering a centralized view of your cloud environment. It provides insights into who is accessing what apps and data in the cloud from where and from which device. <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="1eed2cda-7860-4e42-9019-89bba636de68" href="/us/threat-reference/casb" title="CASB">CASBs</a> catalog cloud services (including third-party OAuth apps), rate the risk level and overall trustworthiness of cloud services, and assign them a score. CASBs even provide automated access controls to and from cloud services based on cloud service risk scores and other parameters, such as app category and data permissions.</p> <p>By leveraging these advanced security solutions, organizations can gain visibility into their shadow IT landscape, deploy deceptive techniques to thwart attackers, and enhance their overall security posture. As the threat landscape continues to evolve, it’s crucial for businesses to proactively address the risks posed by shadow IT and protect their valuable data and resources. By partnering with Proofpoint, organizations can stay ahead of the curve and safeguard their operations against the growing menace of shadow IT. To learn more, <a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="6bc75608-952f-4867-8cc7-9d004280fdee" href="/us/contact" title="Contact Us"><strong>contact Proofpoint</strong></a>.</p> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <div class="paragraph paragraph--type--resources paragraph--view-mode--full resources-block"> <div class="resources-block__wrapper"> <div class="resources-block__inner-wrapper"> <div class="resources-block__heading-wrapper"> <h3 class="resources-block__heading"> Related Resources </h3> </div> <div class="resources-block__resources"> <div about="/us/resources/analyst-reports/cost-of-cloud-compromise-and-shadow-it" class="node--type--resource-item node--view-mode--teaser-v3 resource-teaser-v3"> <a class="resource-teaser-v3__url" href="/us/resources/analyst-reports/cost-of-cloud-compromise-and-shadow-it"> <div class="resource-teaser-v3__image" data-type="analyst-report"></div> <h3 class="resource-teaser-v3__type">Analyst Report</h3> <h4 class="resource-teaser-v3__title"> Ponemon Report: The Cost of Cloud Compromise and Shadow IT </h4> </a> </div> <div about="/us/resources/webinars/leverage-casb-technology-to-stop-cloud-attacks" class="node--type--resource-item node--view-mode--teaser-v3 resource-teaser-v3"> <a class="resource-teaser-v3__url" href="/us/resources/webinars/leverage-casb-technology-to-stop-cloud-attacks"> <div class="resource-teaser-v3__image" data-type="webinar"></div> <h3 class="resource-teaser-v3__type">Webinar</h3> <h4 class="resource-teaser-v3__title"> How to Leverage CASBs to Stop Cloud Security Threats & Attacks </h4> </a> </div> </div> <div class="resources-block__link-wrapper"> <a class="resources-block__link" href="/us/resources"> See more resources </a> </div> </div> </div> </div> <div class="subscribe-block blog-subscribe" data-animate="true"> <div class="subscribe-block__inner blog-subscribe__inner"> <div class="subscribe-block__copy"> <h3 class="subscribe-block__heading"> Subscribe to the Proofpoint Blog </h3> </div> <div class="subscribe-block__form"> <div class="mk-form"> <div class="mk-form__form-container"> <script type="IN/Form2" data-data-form="mktoForm_19277" data-field-firstname="FirstName" data-field-lastname="LastName" data-field-email="Email" data-field-company="Company" data-field-title="Title" data-field-state="State" data-field-country="Country" ></script> <form id="mktoForm_19277" data-mkto-id="19277" data-mkto-base="//app-abj.marketo.com" data-munchkin-id="309-RHV-619" data-submit-text="" data-redirect-link="" data-prefill="" data-event-label="" data-lang-code="us" data-validate-email="1" class="mk-form__form marketo-form-block__form" ></form> </div> </div> </div> </div> </div> <div class="paragraph paragraph--type--space paragraph--view-mode--full space"> <div class="space__wrapper"> <div class="space__item space__md"> </div> </div> </div> <div class="paragraph paragraph--type--cta-banner paragraph--view-mode--full cta-banner cta-banner--bg" data-background-image="/sites/default/files/styles/webp_conversion/public/cta-banner/cta-bkgd.jpg.webp?itok=lGrCI_5c"> <div class="cta-banner__wrapper"> <h2 class="cta-banner__heading"> Ready to Give Proofpoint a Try? </h2> <p class="cta-banner__body">Start with a free Proofpoint trial.</p> <div class="cta-banner__buttons"> <a href=/us/free-trial-request class="global-elements__cta-button--white" target="" > <span>Get Protected</span> <div class="global-elements__cta-button--arrow-wrapper"></div> </a> </div> </div> </div> </div> <div class="glossary__content-pager"> <div class="content-pager"> <div class="content-pager__items-wrapper"> <div class="content-pager__items"> <div class="content-pager__item content-pager__item--prev"> <a href="/us/threat-reference/sendmail" hreflang="en">Previous Glossary</a> </div> <div class="content-pager__item content-pager__item--next"> <a href="/us/threat-reference/single-sign-on-sso" hreflang="en">Next Glossary</a> </div> </div> </div> </div> </div> </article> </div> </div> </div> </section> </main> </div> <div class="footer-v3" data-animate="true"> <div class="footer-v3__inner"> <nav class="footer-v3__nav"> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">Products</div> <ul class="footer-v3__nav-collapsible"> <li><a href="/us/products/protect-people">Protect People</a></li> <li><a href="/us/products/defend-data">Defend Data</a></li> <li><a href="/us/products/mitigate-human-risk">Mitigate Human Risk</a></li> <li><a href="/us/products/premium-services">Premium Services</a></li> </ul> </div> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">Get Support</div> <ul class="footer-v3__nav-collapsible"> <li><a href="https://proofpoint.my.site.com/community/s/" target="_blank">Product Support Login</a></li> <li><a href="/us/support-services">Support Services</a></li> <li><a href="https://ipcheck.proofpoint.com" target="_blank">IP Address Blocked?</a></li> </ul> </div> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">Connect with Us</div> <ul class="footer-v3__nav-collapsible"> <li><a href="tel:+1-408-517-4710" class="icon-phone-ppoint">+1-408-517-4710</a></li> <li><a href="/us/events">Attend an Event</a></li> <li><a href="/us/contact">Contact Us</a></li> <li><a href="/us/free-demo-request">Free Demo Request</a></li> </ul> </div> <div class="footer-v3__nav-wrapper"> <div class="footer-v3__nav-heading">More</div> <ul class="footer-v3__nav-collapsible"> <li><a href="/us/company/about">About Proofpoint</a></li> <li><a href="/us/why-proofpoint">Why Proofpoint</a></li> <li><a href="/us/company/careers">Careers</a></li> <li><a href="/us/leadership-team">Leadership Team</a></li> <li><a href="/us/newsroom">News Center</a></li> <li><a href="/us/legal/trust">Privacy and Trust</a></li> </ul> </div> </nav> <div class="footer-v3__bottom-wrap"> <section class="footer-v3__bottom"> <div class="footer-v3__logo"> <a href="/us" class="footer-v3__logo-link"> <div class="footer-v3__logo-image"></div> </a> <div class="footer-v3__bottom-copyright-info">&copy; 2024. All rights reserved. </div> </div> <div class="footer-v3__bottom-copyright"> <a class="footer-v3__bottom-copyright-info" href="/us/legal/license">Terms and conditions</a> <a class="footer-v3__bottom-copyright-info" href="/us/legal/privacy-policy">Privacy Policy</a> <a class="footer-v3__bottom-copyright-info" href="/us/sitemap">Sitemap</a> </div> <ul class="footer-v3__bottom-social-menu"> <li> <a href="http://www.facebook.com/proofpoint" class="icon-facebook" target="_blank"></a> </li> <li> <a href="http://www.twitter.com/proofpoint" class="icon-twitter" target="_blank"></a> </li> <li> <a href="https://www.linkedin.com/company/proofpoint" class="icon-linkedin" target="_blank"></a> </li> <li> <a href="https://www.youtube.com/channel/UCIvtJgsrUzFo90NKeiVozhQ" class="icon-youtube-play" target="_blank"></a> </li> <li> <a href="https://www.instagram.com/proofpoint" class="icon-instagram" target="_blank"></a> </li> </ul> </section> </div> </div> </div> </div> <script type="text/javascript">document.write(unescape("%3Cscript src='//munchkin.marketo.net/munchkin.js' type='text/javascript'%3E%3C/script%3E")); </script> <script>Munchkin.init('309-RHV-619');</script><div class="element-invisible" style="clear:both;"><!-- Google Code for Remarketing Tag --> <!-------------------------------------------------- Remarketing tags may not be associated with personally identifiable information or placed on pages related to sensitive categories. See more information and instructions on how to setup the tag on: http://google.com/ads/remarketingsetup ---------------------------------------------------> <script type="text/javascript"> /* <![CDATA[ */ var google_conversion_id = 950296937; var google_custom_params = window.google_tag_params; var google_remarketing_only = true; /* ]]> */ </script> <script type="text/javascript" src="//www.googleadservices.com/pagead/conversion.js"> </script> <noscript> <div style="display:inline;"> <img height="1" width="1" style="border-style:none;" alt="" src="//googleads.g.doubleclick.net/pagead/viewthroughconversion/950296937/?value=0&amp;guid=ON&amp;script=0"/> </div> </noscript></div> </div> <div id="flyout-container"></div> <script type="application/json" data-drupal-selector="drupal-settings-json">{"path":{"baseUrl":"\/","pathPrefix":"us\/","currentPath":"node\/103911","currentPathIsAdmin":false,"isFront":false,"currentLanguage":"en"},"pluralDelimiter":"\u0003","suppressDeprecationErrors":true,"ajaxPageState":{"libraries":"eJxlkFFuAzEIRC8Ux6r609tU2Eu8VliwAEfN7etEUdbb_r4BZpgGCkWhrRYX7Q3o3N7k3Ln1RNVWXE4De82EMZGUYD1Z1ppw4oqwZO1bsh1mYUf20KCgzlinzewQEjDPExcRRw23zwkpYnCtQOMcI-1KIUmDIuE2zOwgmIHeA8syGRaRQhguchheR_5hyXA7ssplBiqvsIdwiiZdM4bquP3HFkZt-boL1iBPid59_p1z_PGQhfrGI2r7rh9fHAm49NFoWNAxu-hD2UCv6BK3znm9Vn4wQ9C8xu6Vntu-joaiQ2JI6fnXm4lQAj3Z3cYDMYHhL09Jz7Q","theme":"particle","theme_token":null},"ajaxTrustedUrl":[],"vwo":{"id":767242,"timeout_library":2500,"timeout_setting":2000,"usejquery":"false","testnull":null},"pp_i18n":{"language":"us"},"instantsearch":{"indexName":"content","path":"us\/search"},"user":{"uid":0,"permissionsHash":"26dd96d39e445e838e5f0382a0a4240ea0629de7ad59c3778594246405e2ccf5"}}</script> <script src="/sites/default/files/js/js_bCeVjCOT9dqrw3uyA4tEcspKLMqc2aT3b8QrYsXP3eI.js?scope=footer&amp;delta=0&amp;language=en&amp;theme=particle&amp;include=eJx1kEtuwzAMRC8URSi66W0CSmZkITQpkFTQ3L5yUNTyoks-DjCf1m7144sjAZcOBcOCjtlFL63dNtAHusStc14flXdmCJrX2L2S7bevuGF0EUqgF3uZ4xYTGF4aqNdMGLMoTlJIDClVLoeiiBTCcBd2O-hdxFHD83MSkpiBvgLLcnJgR_bQRgM98IqwnHySDpK1b-ltA0WhrRYX7Q3oepBr59YTVVtxmVwcQgLm2WIESkABaVQ7hbcGeUqYSEqwnixrTRP_Q2Eo8uN4KJp0zWj_PUIdSx_Y8dtDFuobzxMqYnCtI2IDRpq3Ufltc1p432wghucPgKXPtA"></script> <script src="https://geoip-js.com/js/apis/geoip2/v2.1/geoip2.js"></script> <script src="/sites/default/files/js/js_DA7GHFg6Iz1O22c58zPl-nNTEwx5y7RuyKjesK1mXJI.js?scope=footer&amp;delta=2&amp;language=en&amp;theme=particle&amp;include=eJx1kEtuwzAMRC8URSi66W0CSmZkITQpkFTQ3L5yUNTyoks-DjCf1m7144sjAZcOBcOCjtlFL63dNtAHusStc14flXdmCJrX2L2S7bevuGF0EUqgF3uZ4xYTGF4aqNdMGLMoTlJIDClVLoeiiBTCcBd2O-hdxFHD83MSkpiBvgLLcnJgR_bQRgM98IqwnHySDpK1b-ltA0WhrRYX7Q3oepBr59YTVVtxmVwcQgLm2WIESkABaVQ7hbcGeUqYSEqwnixrTRP_Q2Eo8uN4KJp0zWj_PUIdSx_Y8dtDFuobzxMqYnCtI2IDRpq3Ufltc1p432wghucPgKXPtA"></script> <script src="//munchkin.marketo.net/munchkin.js"></script> <script src="/sites/default/files/js/js_Q_hAq3KoriT4uxdUnA3XDouviRgbwswFyj5MCBnzVHU.js?scope=footer&amp;delta=4&amp;language=en&amp;theme=particle&amp;include=eJx1kEtuwzAMRC8URSi66W0CSmZkITQpkFTQ3L5yUNTyoks-DjCf1m7144sjAZcOBcOCjtlFL63dNtAHusStc14flXdmCJrX2L2S7bevuGF0EUqgF3uZ4xYTGF4aqNdMGLMoTlJIDClVLoeiiBTCcBd2O-hdxFHD83MSkpiBvgLLcnJgR_bQRgM98IqwnHySDpK1b-ltA0WhrRYX7Q3oepBr59YTVVtxmVwcQgLm2WIESkABaVQ7hbcGeUqYSEqwnixrTRP_Q2Eo8uN4KJp0zWj_PUIdSx_Y8dtDFuobzxMqYnCtI2IDRpq3Ufltc1p432wghucPgKXPtA"></script> <script src="/themes/custom/proofpoint/apps/drupal/../../dist/app-drupal/assets/js/app.js?q=3BUXyHG2-0E&amp;v=1"></script> <script src="/sites/default/files/js/js_2LYNA9Zu5KE51oXU7U2qX9zbS5cCqO7wzxelxAEWhjk.js?scope=footer&amp;delta=6&amp;language=en&amp;theme=particle&amp;include=eJx1kEtuwzAMRC8URSi66W0CSmZkITQpkFTQ3L5yUNTyoks-DjCf1m7144sjAZcOBcOCjtlFL63dNtAHusStc14flXdmCJrX2L2S7bevuGF0EUqgF3uZ4xYTGF4aqNdMGLMoTlJIDClVLoeiiBTCcBd2O-hdxFHD83MSkpiBvgLLcnJgR_bQRgM98IqwnHySDpK1b-ltA0WhrRYX7Q3oepBr59YTVVtxmVwcQgLm2WIESkABaVQ7hbcGeUqYSEqwnixrTRP_Q2Eo8uN4KJp0zWj_PUIdSx_Y8dtDFuobzxMqYnCtI2IDRpq3Ufltc1p432wghucPgKXPtA"></script> <script src="//app-abj.marketo.com/js/forms2/js/forms2.min.js"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10