{"id":115905,"date":"2024-09-30T16:28:44","date_gmt":"2024-09-30T20:28:44","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=resource&p=115905"},"modified":"2024-11-26T10:40:19","modified_gmt":"2024-11-26T15:40:19","slug":"overcoming-shadow-it","status":"publish","type":"resource","link":"https:\/\/jumpcloud.com\/resources\/overcoming-shadow-it","title":{"rendered":"Overcoming Shadow IT: Why It Happens and How to Prevent It"},"content":{"rendered":"\n
How can you fully secure your environment if you don\u2019t have full visibility and control over all<\/strong> the apps and devices your employees use? <\/p>\n\n\n\n Learn how you can escape a web of unseen applications, unapproved devices, and disastrous repercussions with our recorded webinar, Overcoming Shadow IT: Why It Happens and How to Prevent It.<\/p>\n\n\n\n Watch as a team of shadow IT conquerors discuss how shadow IT happens, why it\u2019s such a pain for IT teams to deal with, and how you can shed light onto what\u2019s happening across your environment with SaaS management.<\/p>\n","protected":false},"excerpt":{"rendered":" How can you fully secure your environment if you don\u2019t have full visibility and control over all the apps and […]<\/p>\n","protected":false},"author":165,"featured_media":115915,"template":"page-templates\/webinar-page.php","categories":[2781],"collection":[2775],"wheel_hubs":[2335],"platform":[],"resource_type":[2336],"funnel_stage":[3016],"coauthors":[2758],"acf":[],"yoast_head":"\n