SHARE
Facebook X Pinterest WhatsApp

Cisco Launches Service to Rein in Shadow IT Services in the Cloud

Tech Security: Here’s How to Rein in Shadow IT Moving to help IT organizations get a better handle on shadow IT in the enterprise, Cisco today unfurled a new service that analyzes log data to determine exactly what cloud services are being consumed by whom inside any organization. Bob Dimicco, senior director of advanced services […]

Written By
MV
Mike Vizard
Jan 13, 2016
Slide Show

Tech Security: Here’s How to Rein in Shadow IT

Moving to help IT organizations get a better handle on shadow IT in the enterprise, Cisco today unfurled a new service that analyzes log data to determine exactly what cloud services are being consumed by whom inside any organization.

Bob Dimicco, senior director of advanced services for Cisco, says the Cisco Cloud Consumption as Service offering works by having IT organizations upload log files into an analytics engine in the cloud that Cisco has developed from the ground up. The idea is to then give internal IT organizations irrefutable proof as to what cloud services are being consumed inside the organization.

Right now, Cisco projects that the average enterprise now uses 1,220 individual cloud services, which may be as much as 25 times more than the internal IT organization often estimates. Cisco says the average number of cloud services has grown 112 percent over the past year, and 67 percent over the past six months.

The challenge that IT organizations face, says Dimicco, is that line-of-business executives are often in denial about how much these cloud services are being used inside their organization. Priced at one to two dollars per month per employee, Dimicco says the goal is to ultimately help internal IT organizations retain control over both compliance and influence over the total amount of money being spent on IT inside any organization.

Of course, shadow IT often cuts both ways. Some IT organizations prefer to turn a blind eye to usage of cloud services that would otherwise require them to allocate limited IT budget dollars to support. At the same time, many IT leaders would at least like to be well informed as to the extent that shadow IT services in the cloud are actually being consumed. Regardless of the stance taken toward shadow IT services, however, it’s almost always in the best interests of the internal IT organization to be prepared for the sudden emergence of a rogue IT service that competes with something they already internally provide.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Strategies for Successful Data Migration
Kashyap Vyas
May 25, 2022
Leveraging AI to Secure CloudOps as Threat Surfaces Grow
ITBE Staff
May 20, 2022
The Emergence of Confidential Computing
Tom Taulli
Apr 20, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.