The document discusses the issue of "shadow IT", which is when employees use cloud services and software-as-a-service applications without IT's knowledge or approval. This creates security risks for organizations. The document recommends that organizations gain visibility into which cloud applications employees are using, establish policies for approved applications, and use a Cloud Access Security Broker to monitor usage and enforce policies in order to manage shadow IT risks while still allowing flexibility.