Chapter 10- What to Do about Shadow IT?
Chapter 10- What to Do about Shadow IT?
Shadow IT?
Value of shadow IT
However, within this generic definition there are “fifty shades of shadow IT”
according to the focus group managers, and in order to identify them it is
important to know where to look. These include:
Personal IT. Here, business people use personal technology developed for
consumers for business purposes. This could be devices, such as smart
phones or tablets, or applications (e.g., What’s App or Dropbox) for
communicating or sharing information.
Unintended use. This can result from social pressure to use unapproved tools
that others are using for communication or to share knowledge.
Personal IT and cloud services have created new ways for employees and
business units to easily circumvent internal IT. In some organizations, business
units have created their own IT teams to implement and support solutions in this
way. Some suggest that this democratization of IT is a natural evolution and that
shadow IT should be renamed “citizen development”. This view holds that shadow
IT is essential for the rapid implementation of specialized, nimble, engaging, and
personalized front-end software. Interestingly, however, several studies show that
much shadow IT is being spent on back office functions — which are typically
centralized and managed by the IT department to achieve synergies and cost
savings. Some of the worst offenders in this area are backups, file sharing,
archiving data, storage, business productivity apps, and social media
communications.
There is no shortage of reasons given for the existence and growth of shadow IT.
Some of the common ones include:
IT processes and constraints. “Often our processes can hamper what the
business units are trying to accomplish,” admitted a manager. “We are
perceived to have too much bureaucracy and take too long to deliver.” “IT has
said ‘no’ so often, it is often perceived as the ‘business prevention group,’”
said another. In short, official IT is perceived as a party killer, not responsive
enough, and lacking necessary tools and capabilities. This may be perception
and reputation, not reality, but it affects business unit decisions.
Ease of use. Shadow IT is about business users solving their own problems
with technology and the cloud has made it much easier for them to do this.
The consumerization of business applications has created an environment
where it is easy for business users to download and configure powerful
systems without the assistance of IT. Vendors and consultants also influence
the business in this regard, according to the focus group.
Rising expectations. As younger, more digitally adept workers have joined the
business, workplaces have become more technically capable and more
comfortable working with development tools and options from the cloud.
These employees expect workplace technology to be as fast and agile as what
they use at home, and when it isn’t, they feel their needs are not being met.
For example, enterprise communication/collaboration tools are seen as
particularly unsatisfactory when compared with personal ones. These rising
expectations are beginning to erase the differences between business and IT
skills.
Lower perceived cost and turnaround. In many cases, business units choose
shadow IT because it is perceived to cost less and take less time to
implement. Often, because IT is seen as inefficient and ineffective, business
leaders may trust an external provider over IT. While this belief may be untrue
given the risks that IT must manage, the focus group noted that shadow IT is
often a way for business to get something done quickly. “Shadow IT grows
gradually,” said a manager. “It’s not even seen as an application until they
need IT.”
The focus group noted that in many organizations, shadow IT has a negative,
chaotic connotation and that IT’s instinct is to clamp down on it. “We have many
problems with shadow IT,” said a manager. “When users do stuff on their own, we
end up paying for it.” Another added, “We have siloed data from many different
CRM systems everywhere. We’re still figuring out how to migrate them into one
system. Implementing a single instance of an application takes more time than just
doing different implementations in different business units.” The focus group also
noted the extra cost involved in having duplicate systems, adding that
procurement should be an enterprise function to gain the synergies involved.
Privacy concerns, data leakage, information Brings customer requirements front and
silos center — can feed the IT pipeline
Single points of knowledge Solves the little stuff, the long-tail projects
However, they also recognized the potential of shadow IT. “It’s a ‘glass half full’
situation,” said a member. “Innovation is happening as a result, but it needs to be
better managed.” Another added, “It’s great for the projects that don’t make the
cut. These are the long-tail processes and little things that could add up to
additional value for the business.” Shadow IT is recognized as an important source
of innovation that can create prototypes for future, approved IT solutions. It’s also
seen as a way to open up opportunities for long-term strategy development and
catalyze entrepreneurial talent hidden in the company, bringing customer
requirements front and center. When used wisely, shadow IT can feed the
corporate IT pipeline and reduce IT workloads by identifying business
requirements for IT. A focus group manager summed up this view of shadow IT by
stating, “We shouldn’t be too sensitive about shadow IT because innovation is
happening with it but, at the same time, business needs to work with us to help
prevent potential problems.”
These problems are very real because shadow IT introduces significant security,
privacy and compliance risks to the organization. For example, Gartner estimates
that one-third of successful attacks on enterprises will soon be on data located in
shadow IT resources and that business units are using many more cloud services
to store critical company data than CIOs were aware of or had authorized. And
many business leaders are unaware of where their data is being stored, often
violating privacy and compliance regulations.
Data leaks and loss of data integrity are particularly significant risks. “It’s taken a
long time but I’ve finally got our executive team to see that we’re a data company,”
said a manager. “Above all else, we need to protect our data.” This can’t happen
when there are myriad unofficial or uncontrolled data flows happening in Excel
One of IT’s biggest concerns about shadow IT is loss of the synergies and
efficiencies that can be achieved when many aspects of IT are controlled
centrally. “Many of our younger, more technically adept employees simply don’t
understand our business model,” said a manager. Another added that there are
many hidden costs involved when people do IT work without experience or
consultation with IT. “It’s like giving a toddler a handgun,” said a manager. “It’s
easy to develop inconsistencies from small differences and errors from not
following rigorous processes.” Business units often don’t understand the costs
involved to IT in helping them fix the problems that develop because apps and
systems can’t speak to each other when the company runs multiple services with
similar functionality or when there are performance issues. These costs can add
up, not only in terms of dollars, but also as a result of the loss of a strategic IT
roadmap for the enterprise as a whole.
Shadow IT Governance
Current IT governance tends to stress adherence to standards and reducing
enterprise risk over delivery speed and innovation and this one-size-fits-all
approach has often driven shadow IT deeper into the shadows and hampered IT
organizations in effectively supporting business-delivered technology. But the
focus group was clear that organizations can effectively govern shadow IT if it is
brought out into the open. “The most important aspect of governing shadow IT is
visibility,” said a manager. “Then what was really rogue IT becomes business
technology (BT).”
IT governance must therefore be enhanced to address and embrace shadow IT.
Organizations have different choices for doing this, depending on their industry
and business model. Some, particularly global enterprises, may stress more
centralized control while others may enable more coordination, collaboration, and
creativity. In any case, having a balance of governance styles with clear but
lightweight guidelines and unambiguous decision rights and responsibilities with
regard to BT, will help bring shadow IT out into the open.
Tightly control data access and what can be done with it. “We’ve created
‘sandboxes’ of masked data for users to use for experiments but these are not
connected to anything else,” said a manager. “We’ve created a castle keep
around our data,” said another. “Our data is locked and monitored,” said a
third.
Provide choice within guidelines. “Whitelist” applications and tools that can
be used; “blacklist” those that cannot. Create an approved list of vendors and
suppliers and set up a virtual corporate marketplace of approved technology
that triggers deployment on request and keeps track of what’s happening.
Continuously enhance this so a business unit is not tempted to be “unfaithful”.
Define clear accountabilities for both business and IT to create value and
reduce risk. “We now have joint accountabilities and our users understand that
it’s not okay to just throw stuff into our network,” a manager noted.
Update policies and guidelines for shadow IT, where it can be used and
where IT needs to be involved. Establish guiderails and touch points to
manage and direct shadow IT. “We need better up-front expectations,” said a
manager. Include shadow IT in event, incident, problem, request management,
and performance metrics.
Educate all employees about what is expected of them with regard to shadow
IT and ensure they understand its implications for the enterprise. “Our people
are educated on privacy and security every year so they now care more about
them,” said a manager.
Leveraging Shadow IT
Although it must be governed, shadow IT represents more than a few frustrated
business users and an irritation to IT. In fact, it is a symptom of a much larger
social and organizational change where technology is osmosing outward from IT
and changing the dividing line between business and IT. This means that IT’s
operating model must change as well. “Shadow IT is a reality check on how we’re
doing in IT,” said a manager. “It is the canary in the coal mine. The world isn’t
standing still and we cannot expect business as usual.” There is broad consensus
that in the longer-term shadow IT will force IT to change to better address
business needs and think differently about what value IT brings to the
organization. Whether or not they like it (and many IT professionals do not), IT is
not going to be able to completely control the use of technology in the
2. IT needs a new mandate. This new role as a consultant, adviser, and partner
to the business should come within the context of an environment that IT must
develop to support, facilitate, measure, govern, and guide shadow IT work. In
this environment, IT will more closely link IT and BT together treating them as
one comprehensive set of capabilities that provides a full range of value and
also better facilitates easier transitions of applications between business and
traditional IT. “The business has always asked IT for help when its technology
grows too complex for it to handle,” said a manager. “In the future, we must
create an ecosystem of tools and services that will enable us to scale an
application if it becomes more broadly useful in the organization or if it
becomes mission critical.”
Increasingly, as well, IT will need to provide specialized technology services to
the rest of the organization through libraries of approved APIs, security testing
and development tools, assistance with vendor evaluation and selection,
Conclusion
2. Explain how third-party access constitutes shadow IT. What are its dangers?
3. How do multiple instances of the same cloud system create problems for IT
and for the organization?
7. What are the two overarching principles for governing shadow IT?
10. What new skills will IT need to work more effectively with shadow IT?
2. The latest SSD thumb drives hold multiple terabytes of data. What danger
does this pose for organizations?
3. An investment firm with more than $20 billion in assets under management
(AUM) used an Excel spreadsheet to manage its trade orders. Do you think
this is a good idea?
6. For Debate: Be it resolved that shadow IT indicates failure on the part of the IT
organization.