Shadow IT

Software, applications, devices, and other technologies that are used or deployed without the knowledge or authorization of the IT team.