{"id":3274,"date":"2022-06-15T11:05:51","date_gmt":"2022-06-15T11:05:51","guid":{"rendered":"https:\/\/locaterisk.com\/?p=3274"},"modified":"2025-08-08T07:27:48","modified_gmt":"2025-08-08T07:27:48","slug":"schatten-it","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/schatten-it\/","title":{"rendered":"Shadow IT: How to Track Hidden Systems"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\"><strong><strong>Shadow IT: How to Track Hidden Systems<\/strong><\/strong><\/h1>\r\n            <p class=\"paragraph\">The IT department can only protect what they know. This makes unrecorded systems an incalculable security risk. The good news: With an automated inventory, so-called shadow IT can be tracked down in no time.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"478\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_\u00dcberwachungskamera-1024x478.png\" alt=\"\" class=\"wp-image-3278\" srcset=\"\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" data-srcset=\"\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>What is shadow IT?<\/strong><\/h3>\n\n\n\n<p>Shadow IT includes all IT systems such as apps, cloud software, networked devices, etc. that exist outside a company's official IT infrastructure and without the knowledge of the IT department. These can be Software as a Service (SaaS) applications used by employees without the permission of IT management. Or old websites that have been forgotten and should have been shut down long ago. This also includes arbitrarily installed productivity and collaboration platforms, provided they are not subject to IT control.&nbsp;<\/p>\n\n\n\n<p>Undetected systems contribute significantly to the attack surface of the IT infrastructure. They are left out of protection and security measures because the IT department is not aware of their existence<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Examples of shadow IT<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Physical devices: <\/strong>Unmonitored personal devices on the corporate network, such as smartphones, as well as devices connected to the home network during remote work and IOT devices (e.g. surveillance cameras in production factories, etc.)<\/li>\n\n\n\n<li><strong>Cloud storage:<\/strong> For example, Google Drive, Dropbox, ...<\/li>\n\n\n\n<li><strong>Productivity applications: <\/strong>For example, Trello, Asana, wrike, Monday.com, ...<\/li>\n\n\n\n<li><strong>Collaboration or messaging apps: <\/strong>For example, Whatsapp on the company's cell phones or collaboration apps like Microsoft Teams, Zoom, Google Meet, ...<\/li>\n<\/ul>\n\n\n\n<p>Since IT administrators are usually unaware of the extent of enterprise-wide shadow IT, they cannot monitor it, let alone protect it. The systems remain unattended in the IT infrastructure yet still reachable on the internet - a welcome gateway for cybercriminals.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How does shadow IT affect network security?<\/strong><\/h3>\n\n\n\n<p>As an employee, think of the number of times you've gone online and installed  an application or connected a printer or Webcam to your company device. Can you imagine how many unrecorded systems accumulate over the years in an organization with many hundreds or thousands of employees? Every account that an employee sets up with his or her company email address opens up a new entry point to the network. Passwords are readily used repeatedly, making it easier for hackers. Any external device that connects to your network is an access point. As long as these devices are not part of the company's IT inventory, they are not monitored.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><b><strong><strong>How to detect shadow IT in your network<\/strong><\/strong><\/b><\/h3>\n\n\n\n<p>Attack vectors or entry points that are not even known to your IT department can be the most trivial little thing and, in the worst case scenario, can cause your entire IT infrastructure to fall into the hands of IT criminals.&nbsp;<\/p>\n\n\n\n<p>With a vulnerability analysis, the dreaded shadow IT can be found in the shortest possible time. In the first step, the systems accessible via the Internet are identified and inventoried based on their IP addresses. The next step is to check for IT security.<\/p>\n\n\n\n<p>We ourselves are always surprised by what we find on the web - it's all there: For example, IOT devices like an automotive supplier's factory floor surveillance camera that transmitted images of the prototype to the Internet or old, unpatched websites that no one knows about anymore, but are still accessible from the internet. Unintentionally publicly accessible development apps and GIT directories also turn up frequently.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"963\" height=\"1024\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-963x1024.png\" alt=\"\" class=\"wp-image-3289\" style=\"width:548px;height:583px\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-963x1024.png 963w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-282x300.png 282w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-768x817.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht-11x12.png 11w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/IT-Inventarbericht.png 1080w\" sizes=\"auto, (max-width: 963px) 100vw, 963px\" \/><figcaption class=\"wp-element-caption\">LocateRisk Demo Report of an IT Inventory<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><b><strong>Conclusion<\/strong><\/b><\/h3>\n\n\n\n<p>The first step in dealing with shadow IT is to know that it exists. An automated IT inventory provides the necessary overview in the shortest possible time. Looking the other way and not knowing is not an alternative. By doing so, you play into the hands of attackers. On the other hand, if you have an overview of your systems and their security status, you can initiate measures and close potential entry points.<\/p>\n\n\n\n<p>For companies that want to gain an overview of their existing network devices and systems: A LocateRisk IT inventory is free of charge and ready in less than 5 minutes.<br>Just send an email to <a href=\"mailto:em@LocateRisk.com\">em@LocateRisk.com<\/a> send<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"schatten-it\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Forgotten systems in the corporate network quickly become a gateway for attackers. Learn what shadow IT is and how to easily detect the systems. <\/p>","protected":false},"author":8,"featured_media":3278,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[28],"class_list":["post-3274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-schatten-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf - LocateRisk<\/title>\n<meta name=\"description\" content=\"Vergessene Systeme im Unternehmensnetzwerk werden schnell zum Eintrittstor f\u00fcr Angreifer. Erfahren Sie was genau Schatten-IT ist und wie Sie die Systeme m\u00fchelos aufsp\u00fcren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/schatten-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Vergessene Systeme im Unternehmensnetzwerk werden schnell zum Eintrittstor f\u00fcr Angreifer. Erfahren Sie was genau Schatten-IT ist und wie Sie die Systeme m\u00fchelos aufsp\u00fcren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/schatten-it\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-15T11:05:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:27:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"504\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf\",\"datePublished\":\"2022-06-15T11:05:51+00:00\",\"dateModified\":\"2025-08-08T07:27:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\"},\"wordCount\":747,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Schatten-IT_U\u0308berwachungskamera.png\",\"keywords\":[\"Schatten-IT\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\",\"name\":\"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Schatten-IT_U\u0308berwachungskamera.png\",\"datePublished\":\"2022-06-15T11:05:51+00:00\",\"dateModified\":\"2025-08-08T07:27:48+00:00\",\"description\":\"Vergessene Systeme im Unternehmensnetzwerk werden schnell zum Eintrittstor f\u00fcr Angreifer. Erfahren Sie was genau Schatten-IT ist und wie Sie die Systeme m\u00fchelos aufsp\u00fcren.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Schatten-IT_U\u0308berwachungskamera.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Schatten-IT_U\u0308berwachungskamera.png\",\"width\":1080,\"height\":504,\"caption\":\"Quelle: shutterstock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/schatten-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shadow IT: How to detect hidden systems - LocateRisk","description":"Forgotten systems in the company network quickly become a gateway for attackers. Find out exactly what shadow IT is and how you can easily detect these systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/schatten-it\/","og_locale":"en_US","og_type":"article","og_title":"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf - LocateRisk","og_description":"Vergessene Systeme im Unternehmensnetzwerk werden schnell zum Eintrittstor f\u00fcr Angreifer. Erfahren Sie was genau Schatten-IT ist und wie Sie die Systeme m\u00fchelos aufsp\u00fcren.","og_url":"https:\/\/locaterisk.com\/en\/schatten-it\/","og_site_name":"LocateRisk","article_published_time":"2022-06-15T11:05:51+00:00","article_modified_time":"2025-08-08T07:27:48+00:00","og_image":[{"width":1080,"height":504,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/schatten-it\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/schatten-it\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf","datePublished":"2022-06-15T11:05:51+00:00","dateModified":"2025-08-08T07:27:48+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/schatten-it\/"},"wordCount":747,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/schatten-it\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","keywords":["Schatten-IT"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/schatten-it\/","url":"https:\/\/locaterisk.com\/schatten-it\/","name":"Shadow IT: How to detect hidden systems - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/schatten-it\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/schatten-it\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","datePublished":"2022-06-15T11:05:51+00:00","dateModified":"2025-08-08T07:27:48+00:00","description":"Forgotten systems in the company network quickly become a gateway for attackers. Find out exactly what shadow IT is and how you can easily detect these systems.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/schatten-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/schatten-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/schatten-it\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/Schatten-IT_U\u0308berwachungskamera.png","width":1080,"height":504,"caption":"Quelle: shutterstock"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/schatten-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Schatten-IT: So sp\u00fcren Sie verborgene Systeme auf"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/3274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=3274"}],"version-history":[{"count":47,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/3274\/revisions"}],"predecessor-version":[{"id":6308,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/3274\/revisions\/6308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/3278"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=3274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=3274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=3274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}