Likewise, from an operational perspective, challenges can
be introduced when devices are deployed without the
knowledge of the personnel that hold a stake in configuring,
monitoring, maintaining and securing the device. Shadow
IT is the deployment of technology components without
centralized oversight and appropriate governance and can
have a significant detrimental impact on IoT usage. Without
someone “at the switch” to ensure that risk scenarios are
addressed, devices behave as expected and devices are
appropriately secured, the enterprise may unknowingly take
on risk that is outside of the enterprise comfort level.