The problem is that when end-users are using whatever solutions they choose without IT approval, the risk of leakage of important information and the opportunity for other security and compliance failures goes way up.
With online data leakage occurring in new and surprising ways these days, why take the chance of sharing databases without providing additional back-end controls?