We old timers remember the emergence of the PC as an IT force. In mainframe dominated organizations, PCs were snuck in, put surreptitiously to work, and then proved themselves more than worthy.
Today, IT itself deploys myriad devices ― so much so they have a hard time keeping track of their own handiwork. And end users and departments are still bringing in their own machines and applications. This has long gone on but in recent years has come to be called Stealth or Shadow IT.
Meanwhile, the average end user has multiple devices: PC, tablet, smartphone, etc. And they are increasingly adept at finding and using new applications.
All this adds up to a major management headache and security threat. IT must get their arms around this problem if they are to provide a safe and effective computing environment.