Best Practices

Orphaned Subscriptions per Company

Orphaned Subscriptions: The SaaS Problem You’re Unaware Of

Over the last decade, business IT has changed significantly. Computing has become more distributed, portable, and personal due to the popularity of the software-as-a-service (SaaS) model of distribution. Previously, IT would purchase a software product and own the installation process across...

What is Shadow IT? Answers to Common Questions.

Shadow IT Explained Shadow IT is the use of IT hardware or software by an individual without the knowledge of IT within the organization. With the rapid proliferation of mobile devices and cloud-based services, IT has moved from being a tightly controlled environment to being an open...

Chart showing saas stack turnover

SaaS Stack – How to Optimize for Flexibility

There’s a good chance that at least one of those hot new SaaS apps you’re about to implement organization-wide is going to be replaced in a year. Whether due to acquisition, funding woes, or a well-publicized security breach, some apps simply don’t stand the test of time. Others will...

G Suite Security Checklist

G Suite Security Checklist For Basic Best Practices

When it comes to security, people can be your best line of defense, or your biggest weakness. Here’s a G Suite Security checklist and best practices to ensure that your team is protected, and that security policies are people-friendly (read: not overly strict). For more information on these...

September 27, 2018 in
A visualization of shadow IT

Enlightened IT, The New Paradigm to end Shadow IT

Shadow IT: A Brief History Enterprise IT was traditionally highly structured, expensive, and limited to a known set of hardware and software vendors. Every project would take a long time (months/years) to implement, typically requiring a lot of custom development to make it all work.

June 28, 2017 in