Managed Security-Fighting Shadow IT

The Risk of

Shadow IT

The Risk of Shadow IT

Are you aware of all the technology that is used within your company? Unauthorized information technology and systems deployed by others than the IT department, so called Shadow IT, poses a lot of risks for your business. In this article we explain how to manage the challenges of Shadow IT.

A Dark Shadow in IT

Shadow IT is a huge problem according to Gartner:

  • Cisco reports that enterprises typically use more than 1,200 cloud services – with over 98% of these Shadow IT
  • A Logicalis CIO survey suggests 90% of CIOs are frequently bypassed by line of business in IT decisions

    Unauthorized Software

    Shadow IT is well known to a technical audience. High level, it’s a term that refers to all tools brought into a business under the radar of IT approval. The most prevalent form of shadow IT involves cloud services, and the many free or low-cost apps available from SaaS providers.

    Typical examples include the use of:

    • Online messaging apps (WhatsApp, Facebook Messenger etc.)
    • Email messaging tools (Gmail, myMail etc.)
    • Document sharing tools (DropBox, Google Docs etc.)
    • Voice over IP software (Skype, Zoom etc.)

    In Search of Capabilities

    It should be noted that most users enter the murky world of shadow IT with good intentions. Business users rely on unauthorized technologies to help them:

    • Save time, get jobs done, meet tight deadlines
    • Access and share data quickly, often remotely
    • Avoid complex IT policies and ‘going through IT’
    • Work with tools that they’re familiar with (and easy to purchase)

    In many ways, this activity can be viewed as an inevitable legacy of BYOD practices. Where people became familiar with finding their own solutions. They also became skilled inside stepping IT, or finding workarounds for any perceived shortfall in capability.

    Worst of all (from an IT perspective at least), users have become less patient, more informed, and definitely more inventive!

    Managing Software Assets

    The challenge for CIOs and IT teams is therefore two-fold:

    • Short-term: to accurately detect and catalogue all software instances running in their organizations
    • Long-term: to ensure the business has access to the full range of tools and services it needs to function properly

    The first point can be quickly addressed with a Cloud & Software Asset Management (SAM) assessment. From here you can quickly build a detailed picture of all ‘live’ assets and conduct an analysis of the security and data compliance risks connected to any unauthorized deployments.

    The second point requires a more strategic analysis of usage patterns, again based on a thorough Cloud & SAM assessment. Do this right, and you’ll be in a position to align budgets to actual need, reduce a significant security and compliance risk, while also ensuring you’re better prepared for any future software audit.

    Enhance Performance, Reduce Risk

    Shadow IT partly stems from user frustrations with the existing tools at their disposal. But the introduction of any unauthorized/unsupported software also brings with it huge risks into the business – risks that end up being ‘owned’ by the CIO or senior IT leaders.

    What you need is external support for investigating the issue, for understanding cause and effect, and for finding a sensible long-term solution. As experts in Cloud & SAM assessments, SoftwareONE can help you quickly get to grips with what software is running in your organization and provide practical recommendations for avoiding any unwanted surprises.

    Do You Know the Status of Your Software Inventory?

    Discover our Software Asset Management Services and visit our SAM website. Contact our SAM team and discuss together how to optimize your software portfolio.

    Contact our Software Asset Managament team

    Comment on this article

    Leave a comment to let us know what you think about this topic!

    Leave a comment


    Peter Verbeeck, Author SoftwareONE Blog

    Peter Verbeeck

    IT-Security Solution Advisor

    IT-Security Solution Advisor

    Related Articles

    • 14 júní 2021
    • Bala Sethunathan
    • Managed Security, Cybersecurity User Awareness, Cyber Threat Bulletin, Cybersecurity

    Cyber Security Update May 2021

    At present, cloud misconfigurations present a high data breach risk. Get to know these best practices that help to secure your cloud-based assets.

    How to Avoid Ransomware Attacks to Better Protect Hyperscale Environments
    • 26 maí 2021
    • Bala Sethunathan
    • Managed Security, Cybersecurity User Awareness, Cybersecurity

    How to Avoid Ransomware Attacks to Better Protect Hyperscale Environments

    Ransomware attacks come in many shapes and forms and can be extremely damaging to an organization. Learn how to protect your hyperscale environment.

    Cyber Security Update April 2021 | SoftwareONE Blog
    • 12 maí 2021
    • Bala Sethunathan
    • Managed Security, Cybersecurity User Awareness, Cyber Threat Bulletin

    Cyber Security Update April 2021

    98% of cyber-attacks rely on social engineering. Keep your business protected and learn more about the latest tactics on the rise.