SlideShare a Scribd company logo
1 of 14
Download to read offline
Bringing IT 
out of the shadows
What is Shadow IT? 
The act of purchasing or using technology for the 
workplace without the approval or knowledge of the IT 
department is called Shadow IT.
Examples 
• DevOps team purchasing an instance of a caching 
server to balance load bypassing IT in order to not 
have users suffer downtime 
• Sales team sharing crucial customer data, even 
internally, using a personal account of Google Drive 
• Using an unauthorised pen drive. Yep!
WHY DOES THIS HAPPEN? 
• IT Department is considered slow and bureaucratic by 
business units in some organizations. 
• With the market moving at breakneck speed, business 
units don’t want to wait for IT to fulfil service 
requests. 
• Overzealous employees with (mostly) good intentions 
Why does this happen?
The catalysts 
• Cloud technology 
• eCommerce 
• Tech savvy credit card toting managers 
• Consumerization of technology
Is the practice of Shadow IT bad? 
Business says 
NO. 
IT says 
YES.
Business IT 
We 
don’t 
have 
,me 
to 
fill 
forms 
If 
you 
don’t 
fill 
forms, 
there 
will 
be 
miscommunica,on 
We 
can 
do 
our 
own 
tech 
research, 
thank 
you. 
We 
do 
that 
too. 
And 
we 
are 
paid 
to 
do 
it. 
IT 
is 
s,ll 
stuck 
in 
with 
80s 
soBware. Stable 
soBware, 
anyone? 
We 
have 
the 
latest 
soBware 
at 
our 
finger,ps 
Good 
luck 
troubleshoo,ng. 
I’d 
rather 
take 
ad-­‐hoc 
decision 
to 
keep 
business 
afloat 
than 
wait 
for 
IT 
Following 
processes 
is 
good 
for 
the 
long 
term.
Business units 
• The need to get things done ASAP. 
• Decentralisation of decision making the 
norm. 
• Decreased bureaucracy 
• Lean organisations and flatter hierarchies.
IT say 
If IT is expected to help you with your tech, 
they need to be aware of the techs you use. 
If IT is expected to firefight, they also need to 
define security guidelines to prevent the fires. 
Proactive is the way to go. Reactive is so 2004.
Risks involved 
• Acquisition of software from dubious sources – 
download sites, cloud services with poor security 
• Ill-researched information leading to bad tech choices 
• Bug infested software 
• Obvious data security risks 
• Risk of malware or virus infiltrating the corporate 
network
“By 2015, 35% of enterprise IT 
expenditures for most organisations 
will be managed outside the IT 
department’s budget.” 35% Source
How to resolve 
• Broad-minded CIO 
The CIO is to the IT organization what the CEO is to the business. 
• Openness of the IT department 
Processes should be designed around the business and not the other way round. 
• Communication 
Let business know the repercussions of bypassing IT. Earn their respect. 
• Protect and to serve 
After all, IT can’t fight something if we don’t know what we are fighting.
In conclusion 
• Shadow IT is necessary evil. 
• Look at Shadow IT as something that takes burden off 
IT while ensuring necessary processes are followed. 
• IT and business units should work together to ensure a 
smooth and productive work environment. 
Bring IT out of the shadows.
This article was originally published in 
Learn more about managing assets in your organisation here. 
freshservice.com hello@freshservice.com

More Related Content

What's hot

Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopLife Cycle Engineering
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterKomand
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to TenableBharat Jindal
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 

What's hot (20)

Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to Tenable
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 

Viewers also liked

Metrics that Matter: Focusing on key metrics for an efficient service desk an...
Metrics that Matter: Focusing on key metrics for an efficient service desk an...Metrics that Matter: Focusing on key metrics for an efficient service desk an...
Metrics that Matter: Focusing on key metrics for an efficient service desk an...Freshservice
 
Gamifying Your Service Desk
Gamifying Your Service DeskGamifying Your Service Desk
Gamifying Your Service DeskFreshservice
 
Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...
Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...
Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...Freshservice
 
10 things you need to STOP doing in your IT service desk
10 things you need to STOP doing in your IT service desk10 things you need to STOP doing in your IT service desk
10 things you need to STOP doing in your IT service deskFreshservice
 
Social Support With Freshdesk
Social Support With FreshdeskSocial Support With Freshdesk
Social Support With FreshdeskFreshdesk Inc.
 
When your favorite characters become support agents
When your favorite characters become support agentsWhen your favorite characters become support agents
When your favorite characters become support agentsFreshdesk Inc.
 
Guide to writing a perfect knowledge base article
Guide to writing a perfect knowledge base articleGuide to writing a perfect knowledge base article
Guide to writing a perfect knowledge base articleFreshdesk Inc.
 
How to write awesome emails that customers love
How to write awesome emails that customers loveHow to write awesome emails that customers love
How to write awesome emails that customers loveFreshdesk Inc.
 

Viewers also liked (8)

Metrics that Matter: Focusing on key metrics for an efficient service desk an...
Metrics that Matter: Focusing on key metrics for an efficient service desk an...Metrics that Matter: Focusing on key metrics for an efficient service desk an...
Metrics that Matter: Focusing on key metrics for an efficient service desk an...
 
Gamifying Your Service Desk
Gamifying Your Service DeskGamifying Your Service Desk
Gamifying Your Service Desk
 
Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...
Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...
Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...
 
10 things you need to STOP doing in your IT service desk
10 things you need to STOP doing in your IT service desk10 things you need to STOP doing in your IT service desk
10 things you need to STOP doing in your IT service desk
 
Social Support With Freshdesk
Social Support With FreshdeskSocial Support With Freshdesk
Social Support With Freshdesk
 
When your favorite characters become support agents
When your favorite characters become support agentsWhen your favorite characters become support agents
When your favorite characters become support agents
 
Guide to writing a perfect knowledge base article
Guide to writing a perfect knowledge base articleGuide to writing a perfect knowledge base article
Guide to writing a perfect knowledge base article
 
How to write awesome emails that customers love
How to write awesome emails that customers loveHow to write awesome emails that customers love
How to write awesome emails that customers love
 

Similar to Shadow IT - What is it, why it happens and how to resolve

Aligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with TechnologyAligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with TechnologyInnoTech
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesJeff Stokes
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden UserJeff Stokes
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018 David Germain
 
Common IT Mistakes
Common IT MistakesCommon IT Mistakes
Common IT MistakesOutsourceIT
 
A Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.comA Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.comBusiness.com
 
Why Do Businesses Need An It Outsourcing Company And It Maintenance Service.pptx
Why Do Businesses Need An It Outsourcing Company And It Maintenance Service.pptxWhy Do Businesses Need An It Outsourcing Company And It Maintenance Service.pptx
Why Do Businesses Need An It Outsourcing Company And It Maintenance Service.pptxBluechip Gulf IT Services
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementdhaydenSlide
 
CEO's Guide Effective IT Management
CEO's Guide Effective IT ManagementCEO's Guide Effective IT Management
CEO's Guide Effective IT Managementguest86c967
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsThe TNS Group
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesJohn Mancini
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowRochester Software Associates
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyPaul McQuillan
 
CRMCS GDPR - Why it matters and how to make it Easy
CRMCS   GDPR - Why it matters and how to make it EasyCRMCS   GDPR - Why it matters and how to make it Easy
CRMCS GDPR - Why it matters and how to make it EasyPaul McQuillan
 
The Perks Of IT Outsourcing
The Perks Of IT OutsourcingThe Perks Of IT Outsourcing
The Perks Of IT OutsourcingNathan Miller
 
Understanding the Data Renaissance in Manufacturing
Understanding the Data Renaissance in ManufacturingUnderstanding the Data Renaissance in Manufacturing
Understanding the Data Renaissance in ManufacturingSafetyChain Software
 
Insecurity Through Technology
Insecurity Through TechnologyInsecurity Through Technology
Insecurity Through Technologydfroud
 

Similar to Shadow IT - What is it, why it happens and how to resolve (20)

Aligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with TechnologyAligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with Technology
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
 
Common IT Mistakes
Common IT MistakesCommon IT Mistakes
Common IT Mistakes
 
A Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.comA Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.com
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
Why Do Businesses Need An It Outsourcing Company And It Maintenance Service.pptx
Why Do Businesses Need An It Outsourcing Company And It Maintenance Service.pptxWhy Do Businesses Need An It Outsourcing Company And It Maintenance Service.pptx
Why Do Businesses Need An It Outsourcing Company And It Maintenance Service.pptx
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Management
 
CEO's Guide Effective IT Management
CEO's Guide Effective IT ManagementCEO's Guide Effective IT Management
CEO's Guide Effective IT Management
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPs
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three Slides
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
 
232 a7d01
232 a7d01232 a7d01
232 a7d01
 
CRMCS GDPR - Why it matters and how to make it Easy
CRMCS   GDPR - Why it matters and how to make it EasyCRMCS   GDPR - Why it matters and how to make it Easy
CRMCS GDPR - Why it matters and how to make it Easy
 
The Perks Of IT Outsourcing
The Perks Of IT OutsourcingThe Perks Of IT Outsourcing
The Perks Of IT Outsourcing
 
Understanding the Data Renaissance in Manufacturing
Understanding the Data Renaissance in ManufacturingUnderstanding the Data Renaissance in Manufacturing
Understanding the Data Renaissance in Manufacturing
 
Team black
Team blackTeam black
Team black
 
Insecurity Through Technology
Insecurity Through TechnologyInsecurity Through Technology
Insecurity Through Technology
 

More from Freshservice

SLA Best Practices
SLA Best PracticesSLA Best Practices
SLA Best PracticesFreshservice
 
Automated Patch Management in Freshservice
Automated Patch Management in FreshserviceAutomated Patch Management in Freshservice
Automated Patch Management in FreshserviceFreshservice
 
Freshservice Q1 2020 feature roundup
Freshservice Q1 2020 feature roundupFreshservice Q1 2020 feature roundup
Freshservice Q1 2020 feature roundupFreshservice
 
Automated patch management in Freshservice
Automated patch management in FreshserviceAutomated patch management in Freshservice
Automated patch management in FreshserviceFreshservice
 
6 automation capabilities to modernise your service desk
6 automation capabilities to modernise your service desk6 automation capabilities to modernise your service desk
6 automation capabilities to modernise your service deskFreshservice
 
4 step implementation of effective self service
4 step implementation of effective self service4 step implementation of effective self service
4 step implementation of effective self serviceFreshservice
 
Q4 2019 feature roundup - Freshservice
Q4 2019 feature roundup - FreshserviceQ4 2019 feature roundup - Freshservice
Q4 2019 feature roundup - FreshserviceFreshservice
 
ITIL Change Management - Plan and deploy changes with confidence
ITIL Change Management - Plan and deploy changes with confidence ITIL Change Management - Plan and deploy changes with confidence
ITIL Change Management - Plan and deploy changes with confidence Freshservice
 
5 things you didn't know you could do with Freshservice Analytics
5 things you didn't know you could do with Freshservice Analytics5 things you didn't know you could do with Freshservice Analytics
5 things you didn't know you could do with Freshservice AnalyticsFreshservice
 
Viewing IT Support from a Customer Service Lens
Viewing IT Support from a Customer Service LensViewing IT Support from a Customer Service Lens
Viewing IT Support from a Customer Service LensFreshservice
 
How to improve life on the Service Desk?
How to improve life on the Service Desk? How to improve life on the Service Desk?
How to improve life on the Service Desk? Freshservice
 
6 Insights from HDI Conference - #HDIconf
6 Insights from HDI Conference - #HDIconf6 Insights from HDI Conference - #HDIconf
6 Insights from HDI Conference - #HDIconfFreshservice
 
3 quick tips to improve service catalog – Infographic
3 quick tips to improve service catalog – Infographic3 quick tips to improve service catalog – Infographic
3 quick tips to improve service catalog – InfographicFreshservice
 
Enterprise service management is finally a business reality
Enterprise service management is finally a business realityEnterprise service management is finally a business reality
Enterprise service management is finally a business realityFreshservice
 
DevOps - Freshservice
DevOps - FreshserviceDevOps - Freshservice
DevOps - FreshserviceFreshservice
 
Increase service desk efficiency with self service
Increase service desk efficiency with self serviceIncrease service desk efficiency with self service
Increase service desk efficiency with self serviceFreshservice
 
Introduction to Freshservice
Introduction to FreshserviceIntroduction to Freshservice
Introduction to FreshserviceFreshservice
 

More from Freshservice (17)

SLA Best Practices
SLA Best PracticesSLA Best Practices
SLA Best Practices
 
Automated Patch Management in Freshservice
Automated Patch Management in FreshserviceAutomated Patch Management in Freshservice
Automated Patch Management in Freshservice
 
Freshservice Q1 2020 feature roundup
Freshservice Q1 2020 feature roundupFreshservice Q1 2020 feature roundup
Freshservice Q1 2020 feature roundup
 
Automated patch management in Freshservice
Automated patch management in FreshserviceAutomated patch management in Freshservice
Automated patch management in Freshservice
 
6 automation capabilities to modernise your service desk
6 automation capabilities to modernise your service desk6 automation capabilities to modernise your service desk
6 automation capabilities to modernise your service desk
 
4 step implementation of effective self service
4 step implementation of effective self service4 step implementation of effective self service
4 step implementation of effective self service
 
Q4 2019 feature roundup - Freshservice
Q4 2019 feature roundup - FreshserviceQ4 2019 feature roundup - Freshservice
Q4 2019 feature roundup - Freshservice
 
ITIL Change Management - Plan and deploy changes with confidence
ITIL Change Management - Plan and deploy changes with confidence ITIL Change Management - Plan and deploy changes with confidence
ITIL Change Management - Plan and deploy changes with confidence
 
5 things you didn't know you could do with Freshservice Analytics
5 things you didn't know you could do with Freshservice Analytics5 things you didn't know you could do with Freshservice Analytics
5 things you didn't know you could do with Freshservice Analytics
 
Viewing IT Support from a Customer Service Lens
Viewing IT Support from a Customer Service LensViewing IT Support from a Customer Service Lens
Viewing IT Support from a Customer Service Lens
 
How to improve life on the Service Desk?
How to improve life on the Service Desk? How to improve life on the Service Desk?
How to improve life on the Service Desk?
 
6 Insights from HDI Conference - #HDIconf
6 Insights from HDI Conference - #HDIconf6 Insights from HDI Conference - #HDIconf
6 Insights from HDI Conference - #HDIconf
 
3 quick tips to improve service catalog – Infographic
3 quick tips to improve service catalog – Infographic3 quick tips to improve service catalog – Infographic
3 quick tips to improve service catalog – Infographic
 
Enterprise service management is finally a business reality
Enterprise service management is finally a business realityEnterprise service management is finally a business reality
Enterprise service management is finally a business reality
 
DevOps - Freshservice
DevOps - FreshserviceDevOps - Freshservice
DevOps - Freshservice
 
Increase service desk efficiency with self service
Increase service desk efficiency with self serviceIncrease service desk efficiency with self service
Increase service desk efficiency with self service
 
Introduction to Freshservice
Introduction to FreshserviceIntroduction to Freshservice
Introduction to Freshservice
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Shadow IT - What is it, why it happens and how to resolve

  • 1. Bringing IT out of the shadows
  • 2. What is Shadow IT? The act of purchasing or using technology for the workplace without the approval or knowledge of the IT department is called Shadow IT.
  • 3. Examples • DevOps team purchasing an instance of a caching server to balance load bypassing IT in order to not have users suffer downtime • Sales team sharing crucial customer data, even internally, using a personal account of Google Drive • Using an unauthorised pen drive. Yep!
  • 4. WHY DOES THIS HAPPEN? • IT Department is considered slow and bureaucratic by business units in some organizations. • With the market moving at breakneck speed, business units don’t want to wait for IT to fulfil service requests. • Overzealous employees with (mostly) good intentions Why does this happen?
  • 5. The catalysts • Cloud technology • eCommerce • Tech savvy credit card toting managers • Consumerization of technology
  • 6. Is the practice of Shadow IT bad? Business says NO. IT says YES.
  • 7. Business IT We don’t have ,me to fill forms If you don’t fill forms, there will be miscommunica,on We can do our own tech research, thank you. We do that too. And we are paid to do it. IT is s,ll stuck in with 80s soBware. Stable soBware, anyone? We have the latest soBware at our finger,ps Good luck troubleshoo,ng. I’d rather take ad-­‐hoc decision to keep business afloat than wait for IT Following processes is good for the long term.
  • 8. Business units • The need to get things done ASAP. • Decentralisation of decision making the norm. • Decreased bureaucracy • Lean organisations and flatter hierarchies.
  • 9. IT say If IT is expected to help you with your tech, they need to be aware of the techs you use. If IT is expected to firefight, they also need to define security guidelines to prevent the fires. Proactive is the way to go. Reactive is so 2004.
  • 10. Risks involved • Acquisition of software from dubious sources – download sites, cloud services with poor security • Ill-researched information leading to bad tech choices • Bug infested software • Obvious data security risks • Risk of malware or virus infiltrating the corporate network
  • 11. “By 2015, 35% of enterprise IT expenditures for most organisations will be managed outside the IT department’s budget.” 35% Source
  • 12. How to resolve • Broad-minded CIO The CIO is to the IT organization what the CEO is to the business. • Openness of the IT department Processes should be designed around the business and not the other way round. • Communication Let business know the repercussions of bypassing IT. Earn their respect. • Protect and to serve After all, IT can’t fight something if we don’t know what we are fighting.
  • 13. In conclusion • Shadow IT is necessary evil. • Look at Shadow IT as something that takes burden off IT while ensuring necessary processes are followed. • IT and business units should work together to ensure a smooth and productive work environment. Bring IT out of the shadows.
  • 14. This article was originally published in Learn more about managing assets in your organisation here. freshservice.com hello@freshservice.com