SHARE
Facebook X Pinterest WhatsApp

Shadow IT: Worse Than We Thought

Study Examines Government Cloud Adoption and Shadow IT The enterprise has many reasons to convert legacy infrastructure into a private cloud: lower costs, greater flexibility and scalability. These are all perfectly valid reasons, but it seems that a key driver is the rise of shadow IT. According to new research from Cisco, shadow IT (and […]

Written By
thumbnail
Arthur Cole
Arthur Cole
Aug 7, 2015
Slide Show

Study Examines Government Cloud Adoption and Shadow IT

The enterprise has many reasons to convert legacy infrastructure into a private cloud: lower costs, greater flexibility and scalability. These are all perfectly valid reasons, but it seems that a key driver is the rise of shadow IT.

According to new research from Cisco, shadow IT (and I’m still waiting for someone to print the obvious acronym here) is much worse than previously suspected. A recent survey of data users showed that the use of unauthorized applications is 15 to 20 times higher than what many CIOs believe. On average, the report states, IT departments estimate their companies utilize about 50 cloud services while in fact the number is 730. And the discrepancy between reality and perception is growing quickly: One year ago, it was 7x, within six months it had jumped to 10x. At this rate, the number of shadow apps could top 1,000 for the average enterprise by the end of the year.

Shadow IT is the natural result of the sheer complexity of the legacy data environment, says Technalysis Research’s Bob O’Donnell. This is evident not only on the infrastructure layer, but in the applications as well, many of which have become so feature-laden and difficult to use that they sit idle in the data center while users look elsewhere for friendlier productivity tools. And if they require something completely new, it is usually available instantly, unlike an IT app, which has to go through development, testing, integration and other steps before it can be accessed by the user.

The pat answer to what the enterprise should do about this has long been to embrace shadow IT, not fight it. But exactly how is this to be done? According to XO Communications’ John Grady, the best approach is the “Five D’s”: Discover, Defend, Destroy, Develop and Discuss. The Discover step is when IT finally admits the facts of shadow IT, much like an alcoholic has to admit the problem before treatment can begin. From there, the enterprise can then Defend against or Destroy shadow apps that truly pose a threat while at the same time Develop rules, policies and infrastructure to support approved services. The key step is Discuss, however, as this is where IT finally gets a handle on what the user base is looking for and how their needs can be addressed.

IT should also recognize that there is just no way internal resources can support the kind of application ecosystem that exists on the public cloud, so no matter how proactive the enterprise becomes, people will still look elsewhere for data functionality, says RJMetrics CEO Robert J. Moore. So the problem isn’t so much that users are no longer relying on IT, it’s that third-party providers suddenly know more about the inner workings of the enterprise than its own data and infrastructure managers do. What is really needed, then, is a centralized data warehouse, even one that exists on the cloud, so that no matter what apps are being used, the enterprise will still retain full control over what really matters: its data.

All of these measures involve giving up some control in order to derive the greater benefits of lower costs and increased productivity. This is a tough pill for many CIOs to swallow, given that they were reared in a world where IT held unrivaled sway over infrastructure and applications.

But it’s a new world we are finding ourselves in, and the change is happening much faster than most enterprise techies are comfortable with. With cloud and mobile computing rewriting the business models of everything from retail to public transportation and oil exploration, enterprises that do not keep up with the times will find that the times, and their profitability, will quickly pass them by.

Arthur Cole writes about infrastructure for IT Business Edge. Cole has been covering the high-tech media and computing industries for more than 20 years, having served as editor of TV Technology, Video Technology News, Internet News and Multimedia Weekly. His contributions have appeared in Communications Today and Enterprise Networking Planet and as web content for numerous high-tech clients like TwinStrata, Carpathia and NetMagic.

Recommended for you...

Best Cloud Security Solutions
Aminu Abdullahi
Jun 24, 2022
Strategies for Successful Data Migration
Kashyap Vyas
May 25, 2022
Leveraging AI to Secure CloudOps as Threat Surfaces Grow
ITBE Staff
May 20, 2022
The Emergence of Confidential Computing
Tom Taulli
Apr 20, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.