IT infiltration