Shadow IT – Threat or Opportunity?

Shadow It

Shadow IT

Shadow IT – sometimes referred to as Stealth IT – describes the usage of IT systems and solutions that are built and used inside businesses and organisations without explicit approval from IT departments and/or management. Fueled by the growth of BYOD policies, Christopher Rentrop, Professor of Informatics at Konstanz University of Applied Sciences, believes it now includes “all applications that are acquired without the IT department’s involvement and whose use is not covered by IT service management”

His definition means the term includes software, cloud apps, workflows and even hardware. While Shadow IT can play an important role in the fields of innovation, research, and development, it also causes problems by frequently failing to adhere to a company’s need for control, documentation, security and reliability.

Compliance

But how much of a threat is the area? Can a company be seriously compromised by unchecked Shadow IT within its walls? We know hardware can be identified by network management tools, but monitoring social media platforms and other cloud-based applications is very difficult. For example, staff can use Facebook or Dropbox to send or publish documents unobserved and pose a compliance risk, while non-approved software and services consume bandwidth, slow networks, and ultimately add to the workload of IT departments. Indeed, half of the IT managers questioned believe that 50 percent of their budget is being eaten up by the management of shadow IT alone.

Some analysts believe that Shadow IT now threatens the very existence of IT departments. They claim that the traditional procurement process is dying, replaced instead by individual departments servicing their own IT needs away from the eyes of the IT departments. Three reasons for this are normally forthcoming; 1) IT departments are slow and cumbersome in terms of action, 2) the IT departments lacks the expertise necessary in certain apps, and 3) the IT department is too expensive and too complex. Research by Gartner suggests that at least 90 percent of all IT spend will be managed outside of the IT department by 2020, with Forrester adding that central IT departments will become largely obsolete.

Current IT Landscape

Rather than posing a problem, it can be argued that this instead represents an opportunity. The reason the traditional procurement processes are dying isn’t the fault of IT departments per se, but because lots of organisations insist on using a method that is 25 years old and out of touch with the current IT landscape. IT departments need to listen to the staff, aiming to become a powerful and forward-thinking force that helps make companies more efficient, effective and profitable.

Staff should not be accused of circumventing IT departments wilfully. Typically they have a problem that they need solving fast. When the world outside the office sees such solutions a download away, it is unrealistic to expect a different, lengthy procedure in work. Such a situation explains the soaring growth of services like Dropbox – emails cannot cope with large attachments, so employees use Dropbox and the problem is solved – with or without the blessing of the IT management.

Shadow IT Infographic: Vanson Bourne

What do you think of Shadow IT, is it a threat to organisations’ internal security, or an opportunity for them to amend and improve their practices? Let us know in the comments below.

Tomorrow we look at the security risks round apps frequently used within the Shadow IT umbrella.

By Daniel Price

Move bot migration

MoveBot – New Data Transfer Platform

Data Transfer Platform Branded post by Movebot As cloud computing and storage continue to provide enhanced ROI to organizations, businesses are storing their data on the cloud– instead of on-premise servers. Storage migration is an ...
Kaylamatthews

What You Need to Know – IoT and Real-Time Operating Systems

Real-Time Operating Systems A real-time operating system, or real-time OS, appears to execute tasks while using a single processing core simultaneously.  However, what's really happening is that the tasks' response time is so fast that ...
Atman Rathod

How APIs and Machine Learning are Evolving? 

Machine Learning Continues to Make API Development Better  For any developer, API or Application Programming Interfaces come as the helpful components to add valuable features and functionalities with the app they develop. API in many ...
Kaylamatthews

New Security Regulation – Cybersecurity Maturity Model Certification (CMMC)

Cybersecurity Maturity Model Certification Changes are on the horizon for the Department of Defense (DoD) and its contractors. Late last year, the DoD announced the Cybersecurity Maturity Model Certification (CMMC), which officially released in January. The ...
David Balaban

Ransomware – Cybercriminal Groups Know The Weak Points

Cybercriminal Groups Grow Data breaches and leaks represent a quickly growing security problem these days. When plenty of people work from home, the risk of data leaks is much higher. Cybercriminal groups know the weak ...
Tunio Zafer

The Evolution of Data File Sharing

Data File Sharing Whether due to a lack of time, need or simply because email started at such an advanced stage, digital data-transfer systems have not progressed as far as physical delivery system. Centuries ago, ...