More and more organizations are seeking to establish control over their business-critical spreadsheets and MS Access databases (also known as “end user computing” – EUC or “user developed applications” – UDA. Demand for control has been stimulated by regulatory activity, such as  Basel II, Solvency II and the Institute of Internal Audit (IIA) GTAG 14. As a result, there are few people with experience of the critical requirements for larger or more complex deployments.

This paper seeks to guide newcomers through some of the issues that organizations will face in completing such a project and the questions they should be asking.

Download The Whitepaper
Prev Next

Get In Touch

Let's talk about how you can control your Shadow IT.