Are you running along with excessive Shadow IT?
Don Gleason
★ Action for outcomes, not outputs ★ Transformer & Team Enabler ★ Owns ?? Relationships ★ Interim / Fractional Executive ★ CIO-CTO-BTO-PMO ★ Adviser ★ Board Member ★ M&A Technology Due Diligence ★ Program Executive ★
"We're?not spending that much on IT."
"Shadow IT" is often used to describe information-technology systems and solutions built and used inside organizations without explicit organizational awareness and approval (be it the IT, Information Security, or the Cyber-Security groups). It is hardware and software within an enterprise that the organization's IT department does not support. It is alternatively termed "Stealth IT" or "Distributed IT" to describe solutions specified and deployed by departments other than the IT department. Like many CIOs, we likely recognize the underlying challenges in our role regarding Shadow IT. When we read the latest State of the CIO reports, we see Shadow IT / Stealth IT is recognized and growing in many organizations. Although the label is neutral, the term often carries a negative connotation. It implies that the IT department has not reviewed or approved the technology or doesn't even know that employees are using it. Shadow IT comes about when the organization's IT department can promptly meet a business unit/department's request. Subsequently, they search and find a solution (such as a cloud-based SaaS (Software as a Service) solution) that meets their 'immediate' needs.
Often, Shadow IT is unavoidable and must be accommodated by IT - but you really need to know what you're dealing with from many aspects (cost, security, efficiency, and more).
Shadow IT can be a vital source for #innovation by many, introducing systems that may be prototypes for future approved IT solutions.? On the other hand, Shadow IT solutions are often not in line with the organization's requirements for sourcing, control, documentation, security, and reliability/maintainability/serviceability - although these issues can apply equally to authorized IT solutions.? In addition to the security and legal risks of Shadow IT, some of the implications can be:
Typical scenario: several groups within a company are securing IT resources & personnel without proper considerations for the technology strategy, privacy/security, maintainability, backups, functional redundancy/duplication, risks/reliability, and more. Compounding the risk includes the fact that most Shadow IT operations use "Click Agreements" (simple, convenient contracts) and, as a result, the IT and Legal departments have no idea of where the organization's data is, where it's stored, and if/where it's backed-up, nor what legal risks and rights may exist. The risks can be enormous and costly (both financially & reputationally.)
If there is a cyber breach or ransomware event, the organization may have no clue about what data is stored where.? Worse, if a crime occurs, they won't know to let PCI (Payment Card Industry Data Security Standard) hosting provider, DoD (Department of Defense), or CMS (Centers of Medicare and Medicaid Services) know promptly.??
There's usually a history.
Shadow IT doesn't happen overnight and is often the result of an impatient employee's/leader's desire for instant gratification & immediate access to hardware, software, or specific web service without going through the necessary steps (controls) to obtain the technology through the proper procurement channels. With one client, only ~58% of the total IT spend was actually under the control of the IT division, leaving ~42% under other divisions and vendors (and buried in budgets as paper, miscellaneous services, consulting, hardware, and more. - resulting in duplicative spending, an inordinate amount of data risk, and lower than expected productivity.
With the pervasiveness of IT and cloud computing, the meaning of Shadow IT expands to include all sorts of technology that employees use at work or niche technology that meets the unique needs of a business division. Whereby support comes from a third-party service provider or in-house group, instead of by the IT division.
Shadow IT can inadvertently introduce risks when unsupported hardware & software do not have the same #security rigor. Technologies circumventing the IT department's processes/knowledge can negatively affect its user experience and introduce other bandwidth, application, and network protocol conflicts. As mentioned previously, Shadow IT can become a compliance concern when an employee stores corporate data in their private/personal online account. CIOs across all industries are elevating #business and IT alignment to improve cost performance, enhance security, and improve working relationships among divisions. Committing to continue nurturing the Business-IT relationship not only achieves alignment but fosters trust.?
Shadow IT includes many forms of IT-related activities and purchases that the IT organization (i.e., division, department, or unit) isn't involved in selecting, sourcing, installing, or maintaining. These purchases may consist of hardware (e.g., servers, PCs, laptops, tablets, and smartphones); Commercial-Off-The-Shelf -COTS) software; and, Cloud Services (e.g., Software-as-a-Service [SaaS], Infrastructure-as-a-Service (IaaS), and Platform-as-a-Service (PaaS).) Cloud Services, especially SaaS, are the most prevalent form of Shadow IT. The number of services & applications & systems has increased, and business units routinely install and use these without involving IT or Information Security / Cyber-Security groups.
There are notable benefits of Shadow IT SaaS which enables users can quickly & easily get tools to increase productivity and interact more efficiently. The challenges of Shadow IT SaaS include the potential of security gaps, such as when IT/InfoSec departments don't know the services & applications in use, often affecting compliance and financial audits.? In addition, it promotes "Application sprawl," wasted time and money, and collaboration inefficiencies.
Across industries, many business enterprises contend with an ever-increasing IT budget - due to the growing bare minimum of IT services needing to be in place to perform critical business tasks. As this number increases, it paves the way for making IT purchases around official channels. These purchases can be one of the main contributors to runaway IT/technology spending.
The Challenge
Corporate risk increases since the IT department did not develop it or was unaware of it and did not support it - increasing the likelihood of 'unofficial' and uncontrolled dataflows, making it more challenging to comply with the Sarbanes-Oxley Act (SOX/SOC2) and other compliance-centric initiatives (e.g., COBIT, FISMA, ISO-27001, GAAP, HIPAA, PCI DSS, TQM, PPACA, HITECH.
Shadow IT can present legal and compliance issues, putting established system relationships and business processes at risk. According to Gartner, more than 50% of all businesses have Shadow IT - with estimates ranging from 30%-100% of the total known IT spend. In 2015 the estimate was 35% of business and only 30% of the known IT spend - the situation will only increase because demand for new applications and services are needed to expand an organization's business and digital transformation - wildly outstripping the capacity of IT to provide meet the demand. As we're also seeing, cloud services are maturing, and employees are becoming more tech-savvy and intolerant of the pace of traditional IT - many of whom have honed their skills to find and support their own IT solutions.
Organizations need to work hard to locate all Shadow IT to protect themselves. The question is, how to tackle, or even capitalize, shadow IT?
Solutioning
When rationalizing these expenses, it is essential to include both the output and the outcome of the applications through business processes and capability delivery. Achieving such understanding can be challenging without an enterprise-wide portal/knowledge base. Accessibility to the data and meaningful analytics is essential - making it much easier to improve the application portfolio genuinely, as both the number of applications and the complexity in the business reduce through collaborative #business & #technology transformation.
If properly managed and in the right hands, Shadow IT can be a benefit to the organization. Some business uses of ShadowIT are advantageous and readily justified - not harmful to the organization and should be controlled as the business unit's operational technology spend - but with the proper #riskmitigation. We work with your team to find Shadow IT using a proven methodology, inventory, & rationalize its presence and evolve Shadow IT into partnered innovation opportunities.
Leveraging our Application Rationalization framework, we work to understand the best alternatives and set out to acquire a great toolset to improve the management of Shadow IT; it is necessary to:
We can help
Together, we'll help improve the management & monitoring of Shadow IT - by documenting its presence through refined processes that include provisions for standard and fast-path technology (Information Technology and other technology purchases.) It also helps the organization manage costs and focus on the desired business outcome, ultimately strengthening it against associated cyber risks.
If you're interested in understanding how DGCpartners can help or just knowing more about accurately reflecting technology budgets and supporting the organization's technology needs more accurately, reach out to me here on LinkedIn or at DGCpartners here on LinkedIn or through our website .
DGCpartners, LLC is an independent management & technology consulting firm offering business & technology advisory services.?DGC brings experienced resources and makes the critical difference at the beginning of the Business-IT turnaround, strategic program, or business startup / rescue / expansion.