Managed Security-Fighting Shadow IT

The Risk of

Shadow IT

The Risk of Shadow IT

Are you aware of all the technology that is used within your company? Unauthorized information technology and systems deployed by others than the IT department, so called Shadow IT, poses a lot of risks for your business. In this article we explain how to manage the challenges of Shadow IT.

A Dark Shadow in IT

Shadow IT is a huge problem according to Gartner:

  • Cisco reports that enterprises typically use more than 1,200 cloud services – with over 98% of these Shadow IT
  • A Logicalis CIO survey suggests 90% of CIOs are frequently bypassed by line of business in IT decisions

    Unauthorized Software

    Shadow IT is well known to a technical audience. High level, it’s a term that refers to all tools brought into a business under the radar of IT approval. The most prevalent form of shadow IT involves cloud services, and the many free or low-cost apps available from SaaS providers.

    Typical examples include the use of:

    • Online messaging apps (WhatsApp, Facebook Messenger etc.)
    • Email messaging tools (Gmail, myMail etc.)
    • Document sharing tools (DropBox, Google Docs etc.)
    • Voice over IP software (Skype, Zoom etc.)

    In Search of Capabilities

    It should be noted that most users enter the murky world of shadow IT with good intentions. Business users rely on unauthorized technologies to help them:

    • Save time, get jobs done, meet tight deadlines
    • Access and share data quickly, often remotely
    • Avoid complex IT policies and ‘going through IT’
    • Work with tools that they’re familiar with (and easy to purchase)

    In many ways, this activity can be viewed as an inevitable legacy of BYOD practices. Where people became familiar with finding their own solutions. They also became skilled inside stepping IT, or finding workarounds for any perceived shortfall in capability.

    Worst of all (from an IT perspective at least), users have become less patient, more informed, and definitely more inventive!

    Managing Software Assets

    The challenge for CIOs and IT teams is therefore two-fold:

    • Short-term: to accurately detect and catalogue all software instances running in their organizations
    • Long-term: to ensure the business has access to the full range of tools and services it needs to function properly

    The first point can be quickly addressed with a Cloud & Software Asset Management (SAM) assessment. From here you can quickly build a detailed picture of all ‘live’ assets and conduct an analysis of the security and data compliance risks connected to any unauthorized deployments.

    The second point requires a more strategic analysis of usage patterns, again based on a thorough Cloud & SAM assessment. Do this right, and you’ll be in a position to align budgets to actual need, reduce a significant security and compliance risk, while also ensuring you’re better prepared for any future software audit.

    Enhance Performance, Reduce Risk

    Shadow IT partly stems from user frustrations with the existing tools at their disposal. But the introduction of any unauthorized/unsupported software also brings with it huge risks into the business – risks that end up being ‘owned’ by the CIO or senior IT leaders.

    What you need is external support for investigating the issue, for understanding cause and effect, and for finding a sensible long-term solution. As experts in Cloud & SAM assessments, SoftwareONE can help you quickly get to grips with what software is running in your organization and provide practical recommendations for avoiding any unwanted surprises.

    Do You Know the Status of Your Software Inventory?

    Discover our Software Asset Management Services and visit our SAM website. Contact our SAM team and discuss together how to optimize your software portfolio.

    Contact our Software Asset Managament team

    Comment on this article

    Leave a comment to let us know what you think about this topic!

    Leave a comment


    Peter Verbeeck, Author SoftwareONE Blog

    Peter Verbeeck

    IT-Security Solution Advisor

    IT-Security Solution Advisor

    Related Articles

    • 15 szeptember 2021
    • Bala Sethunathan
    • Cybersecurity, Managed Security, Cyber Threat Bulletin, Cybersecurity User Awareness
    • Cyber Threats, Ransomware, Vulnerability Management

    Cyber Security Update August 2021

    Accenture and Bangkok Airways suffer from a LockBit Ransomware Attack. Learn why ransomware attacks have become a favorite form of attack.

    Handling GDPR Authorities After a Breach
    • 16 augusztus 2021
    • Bala Sethunathan
    • Cybersecurity, Managed Security
    • GDPR, Cyber Threats, Data Breaches

    Handling GDPR Authorities After a Breach

    If a data breach or ransomware attack occurs in your organization, you must contact GDPR authorities. Here’s what you need to know to prepare.

    • 09 augusztus 2021
    • Bala Sethunathan
    • Cybersecurity, Managed Security, Cyber Threat Bulletin, Cybersecurity User Awareness
    • Cyber Threats, Physical Security Risks

    Cyber Security Update July 2021

    At least one in three reported data breaches involved an insider. Accidental and malicious insider risk can cost businesses 20% of their annual revenue.