Post from 2024-07-21 07:07:48
@
axx
@
cynicalsecurity
I know of some current networks that are built in a similar fashion. You are right that end users tend to fight it, but fortunately "shadow IT" also becomes limited since most data is not directly accessible.
permalink
|
main