Shadow IT

Cloud Computing: The New Shadow IT - Custom Data Center Applications

Grazed from DarkReading. Author: Kaushik Narayan.

If you think you've finally gotten control of unsanctioned user apps, think again. The next wave of rogue apps is on its way from your data center to the cloud. Over the years, the consumerization of IT has spurred a free-for-all in the adoption of cloud services. As employees found unsanctioned applications to help them do their jobs, overwhelmed security teams took a head-in-the-sand approach, giving rise to a serious problem dubbed "Shadow IT."

But how big of a problem is Shadow IT, really? That depends who you ask. Based on my personal conversations, CIOs estimate the number of unsanctioned cloud apps to be around 100. But in a tally based on an analysis of network logs, Shadow IT totals are much larger –averaging roughly 1,000 cloud services in use since early 2015...

Read more from the source @ http://www.darkreading.com/cloud/the-new-shadow-it-custom-data-center-applications/a/d-id/1328590

Shadow IT risks heightened in hybrid cloud

Grazed from TechTarget. Author: Tom Nolle.

While there are many advantages to cloud computing, there are also drawbacks, including shadow IT. Driven by cloud's low-cost, as a service model, shadow IT shifts traditional IT and CIO functions to a business's line departments. And while shadow IT risks have been discussed before, a new risk is emerging, specifically within hybrid clouds.

To many companies, shadow IT is a way of decoupling a business's response to a problem or opportunity from a high-inertia IT world. A line department buys compute services from a cloud provider, and adjusts the services to fit business needs. The shadow IT model may not work for every application, but it works well for at least some applications in every enterprise -- and it's only going to expand as cloud adoption grows...

Cloud Computing: How to Turn Hillary Clinton's "Shadow IT" Habits into Opportunity

Grazed from MotleyFool.  Author: Anders Bylund.

Hillary Clinton has certainly been newsworthy recently. Stretching from the late 1990s and all the way through her stints as U.S. Senator and Secretary of State, ending in 2013, Clinton shunned government-run email services in favor of a system running in the home she shared with former president Bill Clinton. Critics argue this practice violated government policies, not to mention allowing her (and Bill) to avoid public disclosure of her service-related communications.

The official policy that ties federal officials to government-run email systems wasn't the law of the land until 2014, nearly two years after Clinton stepped out of the political life again. Nevertheless, she's still in the national spotlight over this old-yet-fresh scandal...

Why the Enterprise Cloud Needs Shadow IT to Succeed

Grazed from CIO. Author: Bernard Golden.

I stumbled across a ZDNet article by Larry Dignan linking to Rightscale’s 2015 State of the Cloud Report referencing how Azure’s use is growing and it’s now become an emerging No. 2 competitor to AWS, a la the famous Avis commercials of long ago, where Avis said “we’re number two but we try harder.” This aligns with the general perception that Microsoft seems to have gotten its feet under it and is charging hard into the public cloud.

After downloading the report, subtitled “Central IT is Taking the Lead to Broker Cloud Services to the Enterprise,” I believe the more interesting and important material is, so to speak, buried in the back pages -- where the respondent’s adoption patterns and technology choices are surveyed...

Shadow Cloud Services: Seeing the Light with Cloud Computing

Grazed from MSPHub.  Author: Editorial Staff.

According to a recent article from CIO, “many companies contain workstations with software that is not approved by the Information Technology (IT) department; instead, it has been adopted and installed by individuals or even, in some cases, entire departments.” Simply put, not just employees but entire business units are now willing to circumvent IT policies they find too restrictive, and the open nature of public cloud services makes this a simple task.

Of course, such unsanctioned use comes with real risk. For example, DevOps work done with unapproved services puts sensitive data beyond the reach of corporate firewalls and other securitymeasures. E-discovery requests also become problematic, since IT professionals do not have knowledge of data use from start to finish. In addition, asset management is an issue, since productivity may spike without a definitive cause, making budgetary discussions more complicated. Ultimately, ignoring shadow cloud services is not an option, but controlling them can prove difficult...

Do you know if "shadow IT" cloud services present a problem to your company?

Grazed from Network World. Author: Linda Musthaler.

Does your organization have a shadow IT problem? Would you even know if you did? According to the Cloud Security Alliance (CSA), 72% of respondents to the 2014 Cloud Adoption Practices and Priorities survey know the scope of shadow IT in their computing environments.

CSA defines shadow IT as “technology spending and implementation that occurs outside the IT department, including cloud apps adopted by individual employees, teams, and business units.” Nearly half of the survey respondents (49%) say their primary concern about shadow IT is the security of corporate data in the cloud...

Cloud Computing: Shedding Some Light on Shadow IT Management

Grazed from DataCenterKnowledge. Author: Tom Bice.

Shadow IT has been lurking in the dark corners of organizations for years now, but as BYOD and public cloud computing gain traction in the workplace more and more employees are stealthily adopting their own software and hardware without telling IT. When IT is left in the dark it makes it nearly impossible to mitigate potential risks, and in light of the recent barrage of data breaches executives are becoming increasingly concerned about the issue.

So what can you do? First and foremost, accept that shadow IT is here to stay. IDC found that the majority of information workers share files via email and other unsecure methods while only a small group, about 10 percent, use a service provided by their company. Rather than trying to squash all instances of shadow IT that pop up in your organization, put a plan in place to help manage it. The following tips can help get you started...

Read more from the source @ http://www.datacenterknowledge.com/archives/2015/01/26/shedding-light-shadow-management/

Solving shadow IT problems with hybrid cloud

Grazed from CloudComputingIntelligence.  Author: Ian Finlay.

The business challenges of shadow IT have emerged from the darkness and are now firmly in the spotlight. With PwC estimating that shadow IT accounts for between 15 and 30% of IT spending outside of the IT enterprise budget, it not only presents a real blind spot for enterprises, but has a significant impact upon both the security and integrity of company information, and customer confidence.

IT departments no longer have control over all IT solutions implemented within the organisation. With many trying to lock down their infrastructures to prevent shadow IT the balance has been tipped too far. By bringing it out of the shadows and into plain sight, enterprise IT Directors will be able to regain control and ensure their entire infrastructure – wherever it is - is transparent and compliant...

Cloud Computing: Shadow IT is in your enterprise - 7 steps to control it

Grazed from TechPageOne. Author: Scott Koegler.

Enterprise employees understand how to use external consumer resources available as cloud or software-as-a-service (SaaS) platforms, and they often take advantage of the simplicity of these services without consulting IT. But using systems without company approval, a practice known as “shadow IT,” can eventually become liabilities for businesses in terms of management, costs and security.

Organizations that help executives address IT-related challenges, such as the MIT Center for Information Systems Research, caution against leaving shadow IT unchecked. “Local innovation is great,” says Jeanne Ross, director at the center, “but only if IT has gained control of shared infrastructure and common enterprise systems. Otherwise, shadow IT can spell disaster.” To understand the practice and risks of shadow IT, and to help you learn how to corral it to meet employee needs, take these seven steps:...

Cloud & The Fuzzy Math of Shadow IT

Grazed from DarkReading. Author: Krishna Narayanaswamy.

Organizations are adopting the cloud in a big way. Today, representing about 23% of IT spend, cloud computing has accelerated because it allows people to get their jobs done more quickly, more easily, and more flexibly than they can using traditional computing tools. Set to account for 60% of cloud services in 2017, software-as-a-service has proliferated in enterprises and has now reached a tipping point.

IT has responsibility for some cloud apps. Most IT departments I’ve talked to say they have responsibility for a handful of cloud deployments, maybe 10 at most, and further estimate that they have 40-50 total apps running per organization. In reality, they have an average of 461 cloud apps, according to our latest Cloud Report, an aggregated, anonymized measure of cloud app usage from the Netskope Active Platform...