NEW: Unlock the Future of Finance with CRYPTO ENDEVR - Explore, Invest, and Prosper in Crypto!
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
No Result
View All Result

ManageEngine Report Points the Way Forward

ManageEngine Report Points the Way Forward
Share on FacebookShare on Twitter

Rewrite the

ManageEngine, a division of Zoho Corporation and a leading provider of enterprise IT management solutions, released its report, The Shadow AI Surge in Enterprises: Insights from the U.S. and Canadian Workplace. Based on a survey of IT decision makers (ITDMs) and business employees, the report investigates the rise of shadow AI—unauthorized AI tools used for work—and identifies critical gaps that organizations need to close if they want to reduce the risks of shadow AI and turn it into a strategic advantage.

Also Read: AiThority Interview with Ian Goldsmith, CAIO of Benevity

  • The rise: 60% of employees are using unapproved AI tools more than they were a year ago, and 93% of employees admit to inputting information into AI tools without approval.
  • The risks: 63% of ITDMs see data leakage or exposure as the primary risk of shadow AI. Conversely, 91% of employees think shadow AI poses no risk, not much risk, or some risk that’s outweighed by reward.
  • The rewards: Summarizing notes or calls (55%), brainstorming (55%), and analyzing data or reports (47%) are the top tasks employees complete with shadow AI. Generative AI text tools (73%), AI writing tools (60%), and code assistants (59%) are the top AI tools ITDMs have approved for employee use.

“Shadow AI represents both the greatest governance risk and the biggest strategic opportunity in the enterprise,” said Ramprakash Ramamoorthy, director of AI research at ManageEngine. “Organizations that will thrive are those that address the security threats and reframe shadow AI as a strategic indicator of genuine business needs. IT leaders must shift from playing defense to proactively building transparent, collaborative, and secure AI ecosystems that employees feel empowered to use.”

Also Read: Data Analytics and AI: Dominating Trends

Identifying the Shadow AI Gaps

To turn the use of shadow AI from a liability into a strategic advantage, IT leaders need to close the gaps in education, visibility, and governance revealed by the report. Specifically, a lack of education around AI model training, safe user behavior, and organizational impact is driving systematic misuse. Blind spots continue to grow in organizations, even as IT teams move to approve and integrate AI tools as quickly as possible. Meanwhile, shadow AI proliferates due to inadequate enforcement of established governance policies.

  • 85% of ITDMs report that employees are adopting AI tools faster than their IT teams can assess them.
  • 32% of employees entered confidential client data into AI tools without confirming company approval, while 37% entered private, internal company data.
  • 53% of ITDMs say employees’ use of personal devices for work-related AI tasks is creating a blind spot in their organization’s security posture.
  • Only 54% of ITDMs report their organizations have implemented clear, enforced AI governance policies and actively monitor for unauthorized use, while 91% have implemented policies overall.

Pivoting to Proactive AI Management

Proactively managing AI means harnessing employee initiative while maintaining security. It delivers the business value discovered in shadow AI but does so via AI tools that are approved by IT. To that end, ITDMs and employees make several strategic recommendations in the report.

  • 63% of ITDMs advise integrating approved AI tools into standard workflows and business applications, 60% suggest implementing clear policies on acceptable AI use, and 55% suggest establishing a list of vetted and approved tools.
  • 66% of employees recommend setting clear policies that are fair and practical, 63% recommend providing official tools that are relevant to their tasks, and 60% advise providing better education on understanding the risks.

“Shadow AI is a fatal flaw for most organizations,” said Sathish Sagayaraj Joseph, regional technical head at ManageEngine. “IT teams can’t manage risk they can’t see—and they can’t enable business value that users won’t divulge. Proactive AI management unites IT and business professionals in their pursuit of common, organizational goals. That means employees are equipped to understand and avoid AI-related risks, and IT is empowered to help them use AI in ways that drive real business outcomes.”

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

in well organized HTML format with all tags properly closed. Create appropriate headings and subheadings to organize the content. Ensure the rewritten content is approximately 1500 words. Do not include the title and images. please do not add any introductory text in start and any Note in the end explaining about what you have done or how you done it .i am directly publishing the output as article so please only give me rewritten content. At the end of the content, include a “Conclusion” section and a well-formatted “FAQs” section.

cryptoendevr

cryptoendevr

Related Stories

How a 12-year-old bug in Sudo is still haunting Linux users

How a 12-year-old bug in Sudo is still haunting Linux users

July 8, 2025
0

Rewrite the The vulnerability, with a critical CVSS rating of 9.3 out of 10, affects Sudo versions 1.9.14 through 1.9.17,...

ClickFix-Attacken bedrohen Unternehmenssicherheit

ClickFix-Attacken bedrohen Unternehmenssicherheit

July 8, 2025
0

Rewrite the Cyberkriminelle greifen immer häufiger auf ClickFix-Angriffe zurück.NAJA x -shutterstock.com Weniger bekannt als Phishing ist die Social-Engineering-Methode ClickFix. Ziel...

Coretek Acquires Total Solutions, Expanding Capabilities in AI, Data, and Microsoft Cloud Services

Coretek Acquires Total Solutions, Expanding Capabilities in AI, Data, and Microsoft Cloud Services

July 8, 2025
0

Rewrite the Coretek, a leader in artificial intelligence, cloud, and security services, announced the acquisition of Total Solutions, Inc, a Detroit,...

Has CISO become the least desirable role in business?

Has CISO become the least desirable role in business?

July 8, 2025
0

Rewrite the For those reasons, Basu is helping to establish a professional association for CISOs modeled on entities like the...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Bitcoin Bullish Again? Potential All-Time High in Sight: Analysis

Bitcoin Bullish Again? Potential All-Time High in Sight: Analysis

July 3, 2025
Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang

Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang

July 3, 2025
Bitcoin Rejected! | Stock Markets Losing MAJOR Support! | Options Closeout!

Bitcoin Rejected! | Stock Markets Losing MAJOR Support! | Options Closeout!

July 3, 2025

Arthur Hayes and Hanson Birringer on Hyperliquid’s Success (And What Could Stop It)

July 3, 2025
Circle stock outpaces Bitcoin with 472% growth since June IPO

Circle stock outpaces Bitcoin with 472% growth since June IPO

July 3, 2025

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

CRYPTO ENDEVR

About Us

Crypto Endevr aims to simplify the vast world of cryptocurrencies and blockchain technology for our readers by curating the most relevant and insightful articles from around the web. Whether you’re a seasoned investor or new to the crypto scene, our mission is to deliver a streamlined feed of news and analysis that keeps you informed and ahead of the curve.

Links

Home
Privacy Policy
Terms and Services

Resources

Glossary

Other

About Us
Contact Us

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

© Copyright 2024. All Right Reserved By Crypto Endevr.

No Result
View All Result
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms

Copyright © 2024. All Right Reserved By Crypto Endevr