The Risk of
Shadow IT

The Risk of Shadow IT

  • Peter Verbeeck
  • Software Asset Management, Managed Security
  • SAM Simple, Shadow IT, IT-Security

Are you aware of all the technology that is used within your company? Unauthorized information technology and systems deployed by others than the IT department, so called Shadow IT, poses a lot of risks for your business. In this article we explain how to manage the challenges of Shadow IT.

A Dark Shadow in IT

Shadow IT is a huge problem according to Gartner:

  • Cisco reports that enterprises typically use more than 1,200 cloud services – with over 98% of these Shadow IT
  • A Logicalis CIO survey suggests 90% of CIOs are frequently bypassed by line of business in IT decisions

    Unauthorized Software

    Shadow IT is well known to a technical audience. High level, it’s a term that refers to all tools brought into a business under the radar of IT approval. The most prevalent form of shadow IT involves cloud services, and the many free or low-cost apps available from SaaS providers.

    Typical examples include the use of:

    • Online messaging apps (WhatsApp, Facebook Messenger etc.)
    • Email messaging tools (Gmail, myMail etc.)
    • Document sharing tools (DropBox, Google Docs etc.)
    • Voice over IP software (Skype, Zoom etc.)

    In Search of Capabilities

    It should be noted that most users enter the murky world of shadow IT with good intentions. Business users rely on unauthorized technologies to help them:

    • Save time, get jobs done, meet tight deadlines
    • Access and share data quickly, often remotely
    • Avoid complex IT policies and ‘going through IT’
    • Work with tools that they’re familiar with (and easy to purchase)

    In many ways, this activity can be viewed as an inevitable legacy of BYOD practices. Where people became familiar with finding their own solutions. They also became skilled inside stepping IT, or finding workarounds for any perceived shortfall in capability.

    Worst of all (from an IT perspective at least), users have become less patient, more informed, and definitely more inventive!

    Managing Software Assets

    The challenge for CIOs and IT teams is therefore two-fold:

    • Short-term: to accurately detect and catalogue all software instances running in their organizations
    • Long-term: to ensure the business has access to the full range of tools and services it needs to function properly

    The first point can be quickly addressed with a Cloud & Software Asset Management (SAM) assessment. From here you can quickly build a detailed picture of all ‘live’ assets and conduct an analysis of the security and data compliance risks connected to any unauthorized deployments.

    The second point requires a more strategic analysis of usage patterns, again based on a thorough Cloud & SAM assessment. Do this right, and you’ll be in a position to align budgets to actual need, reduce a significant security and compliance risk, while also ensuring you’re better prepared for any future software audit.

    Enhance Performance, Reduce Risk

    Shadow IT partly stems from user frustrations with the existing tools at their disposal. But the introduction of any unauthorized/unsupported software also brings with it huge risks into the business – risks that end up being ‘owned’ by the CIO or senior IT leaders.

    What you need is external support for investigating the issue, for understanding cause and effect, and for finding a sensible long-term solution. As experts in Cloud & SAM assessments, SoftwareONE can help you quickly get to grips with what software is running in your organization and provide practical recommendations for avoiding any unwanted surprises.

    Do You Know the Status of Your Software Inventory?

    Discover our Software Asset Management Services and visit our SAM website. Contact our SAM team and discuss together how to optimize your software portfolio.

    Contact our Software Asset Managament team
    • Wednesday 10 July 2019

    Comment on this article

    Leave a comment to let us know what you think about this topic!

    Leave a comment

    Author

    Peter Verbeeck, Author SoftwareONE Blog

    Peter Verbeeck IT-Security Solution Advisor

    IT-Security Solution Advisor

    Related Articles

    Oracle Java Security Challenges - What you need to know
    • 19 July 2019
    • Abhishek Gupta
    • Managed Security, Publisher Advisory
    • Oracle

    Oracle Java Security Challenges - What You Need to Know

    SoftwareONE’s latest blog covers the recent Oracle Java support policy updates – be sure to read on to understand how to best protect your environment.

    How to Decide for a Data Backup Provider
    • 18 July 2019
    • Sanjay Miyanger
    • Managed Security, Publisher Advisory, Managed Backup
    • Data Backup, Backup Recovery, Data, BackupSimple

    How to Decide for a Data Backup Provider

    Data backup is an essential function for every business. So how do you choose the right backup provider for your organization? Here is a guide to help you decide.

    It’s Simplicity Day! Reduce IT Complexity with Managed
    • 12 July 2019
    • Blog Editorial Team
    • Unified Communications, Software Asset Management, Managed Cloud, Managed Security, Managed Backup
    • BackupSimple, UCSimple, SAM Simple, AzureSimple

    It’s Simplicity Day! Reduce IT Complexity with Managed Services

    At SoftwareONE, we have a firm commitment to making the lives of IT professionals simple. Find out how we accomplish this through managed services.