6 Tips for Combating Shadow IT Once and for All

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next 6 Tips for Combating Shadow IT Once and for All-6 Next

Governance, Risk and Compliance (GRC)

Incorporate shadow IT programs into your GRC strategy.

IT organizations should strive to govern all shadow IT programs as part of their GRC strategy. Even in cases of LOBs, CMOs or chief digital officers (CDOs) initiating a discussion of a cloud service with a provider, the IT organization must be able to monitor these services to both ensure service performance and mitigate risks. IT should also participate in the negotiation with the external providers to ensure that the offered services comply with the necessary regulatory requirements as well as help leverage the corporate economies of scale in order to negotiate the best rates for the corporation and avoid waste created by purchase of duplicate services.

It's a common complaint across the enterprise: IT is too slow moving and far too restrictive to give corporate stakeholders, such as lines of business (LOBs), CMOs and employees, the tools they need to succeed in their jobs. However, the digital transformation that we are seeing many industries undergo is making this notion a little more complex. Easily accessible applications, lack of bring-your-own-device (BYOD) policies and free cloud services are giving employees the option to go around their IT departments and utilize alternative services. Thus, enterprises are essentially creating "shadow IT" organizations, in which their employees sidestep IT and create a digital transformation in and of themselves.

And this might sound like a great solution – employees are happy with their environments while their IT departments are none the wiser. However, creating a shadow IT organization is not without its flaws, especially when IT departments don't have complete visibility of their employees' systems. If they don't have full visibility, their companies are much more vulnerable to cybersecurity attacks, service outages and other risks that may threaten mission-critical applications.

In order to best mitigate these risks, IT departments need better insight into their users' traffic behavior so they can identify the cause of any threats. Furthermore, it's possible for IT to reverse these trends entirely and make CIOs and IT teams the go-to partners for what was previously considered shadow IT. To do this, however, they must first demonstrate the necessary agility and high quality of complex service assurance that users are looking for with the following six strategies, identified by Michael Segal, director of enterprise solutions, NETSCOUT.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

IT_Man89-290x195 9 Tips for Running a 'Tween' Company

Advice and tips for entrepreneurs and companies that are no longer startups but not quite ready for an IPO, also known as "tweens." ...  More >>

IT_Man88-190x128 Top 5 Trends Affecting Women-Owned Micro Businesses

Learn more about the challenges and opportunities presented to women leaders, especially micro-business owners. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.