SlideShare a Scribd company logo
1 of 20
Shedding Light on Shadow IT
Microsoft Enterprise Architecture Round Table
David Lavin, Ramit Luthra, Karun Pothacamury, Donald Stahl, Tom Valva
October 16, 2014
What is Shadow IT?
• Shadow IT are those technology
related activities that are not
controlled and administered by the
“official” centralized IT function
• The centralized IT function believes
that these activities are part of the IT
organizations charter, and would
normally be under its control
What Drives Shadow IT?
• Shadow IT groups desire to operate independently of
the centralized IT function for various reasons:
– Competitive drivers
– Pressure to innovate
– Availability of cloud services
– Desire for independence
– Enhanced productivity
– Specialized domain knowledge
– Control over the development life-cycle
– Budget autonomy
Types of Shadow IT
• Practice driven
• Rogue efforts
• Purpose driven
Types of Shadow IT – Practice Driven
– In this model, a group
that is part of a distinct
practice within the
organization performs its
own technology
management partially or
entirely independently of
the central IT organization
Types of Shadow IT – Practice Driven
• Legacy
– Precedes the formulation of a mature IT organization
– The group uses its own resources and expertise to create
and/or adopt technology as needed
– Groups were never considered a technology function
– Distinct from the groups that traditionally used the first
computer software
– Often these are delivery-critical operational groups
(warehouse management, media productions, sales)
– Deal with technologies and vendors of which the IT
organization has no hands-on experience, or operational
knowledge
Types of Shadow IT – Practice Driven
• Organic
– Strong focus on customer/consumer facing technologies.
– Management of B2C web presences, mobile application development, and
other public-facing technology assets for the business.
– Driven by market pressures and competition; often part of marketing
departments.
– Centralized IT often lacks capabilities, particularly in the mobile design
areas
Types of Shadow IT – Practice Driven
• Expert
– Requires high degree of subject matter
expertise; development must be tightly coupled
with experts
– Close client contact for customized solutions
and complex algorithm development drives
these groups to seek independence and control
over development.
– Often complex scientific or financial
applications where traditional corporate IT
resources cannot (or are perceived to not be
able to) deliver.
Types of Shadow IT – Rogue Efforts
• Rogue efforts are those IT projects
that are intentionally hidden or
kept separate from the centralized
IT organization
• Rogue efforts may be sponsored
or unsponsored
• Rogue efforts use few IT resources
from the centralized IT function
Types of Shadow IT – Skunk Works
– Skunk works are often sponsored
– Frees engineers from ‘structured’
approach to foster innovation
– If successful can be folded back
into the centralized IT function
Types of Shadow IT – Black Ops
• Unsponsored efforts
• Usually smaller than skunk works
projects
• Often driven by frustration with IT and
backlogs
• May be of limited scope and use
• May go undetected for years
Types of Shadow IT – Purpose Driven
– Productivity needs are often the
drivers of Purpose Driven efforts
– Often extensions to formal IT
systems
– Frequently enabled by desktop
technologies
– Often discovered when problems
occur requiring IT intervention
– Cloud SaaS offerings encourage
Purpose Driven efforts
Pros and Cons of Shadow IT
Practice Driven Pros:
- Better business alignment
- Unique value
- Natural agility
Practice Driven Cons:
- Infrastructure duplication
- Compliance Risk
Pros and Cons of Shadow IT
Rogue Effort Pros:
- Highly innovative, creative
- Dedicated teams focus intensely
- Natural agility
Rogue Effort Cons:
- Compliance & security Risk
- Lack of support
- Initial success may not scale
- May lack broad application
Pros and Cons of Shadow IT
Purpose Driven Pros:
- Often improve productivity
- Extend existing systems capabilities
- Can point to integration opportunities
- Don’t initially impact IT budget
Purpose Driven Cons:
- May eventually require IT support
- Duplication of effort
- Compliance Risk
Purpose
Driven
Efforts
Rogue
Efforts
Practice
Driven
Efforts
Traditional
IT
Services
• Traditional IT provides some
but not all services, such as
email, networking, directory
and authentication.
• Rogue efforts tend to use a
minimum IT services
• Practice and Purpose driven
tend to use more services,
such as server provisioning,
but not application
development and/or support
Figure: 1 Intersection of Traditional and Shadow IT
Architecture &
Database Design
Purpose
Driven
Practice
Driven
Traditional
IT
Rogue
Development
Requirements
Analysis
Quality Assurance
User Acceptance
Testing (UAT)
Software
Development
Requirements
Analysis
Quality Assurance
User Acceptance
Testing (UAT)
Software
Development
Architecture &
Database Design
Requirements
Analysis
Security Compliance
Quality Assurance
User Acceptance
Testing (UAT)
Software
Development
Architecture &
Database Design
Requirements
Analysis
I&O Support (servers,
hosting, upgrades)
Security Compliance
Quality Assurance
User Acceptance
Testing (UAT)
Software
Development
Non-IT Developers, Testers, Architects, Analysts, SMEs IT Developers, Testers, Architects, Analysts, DBAs
IT Infrastructure and Operations AnalystsIndependent SaaS, PaaS, vendors, closets, etc.
IT Security AnalystsIndependent Security Analysts, disregarded
I&O Support (servers,
hosting, upgrades
I&O Support (servers,
hosting, upgrades
Architecture &
Database Design
Architecture &
Database Design
Architecture &
Database Design
Service Providers:
Shadow IT Service Provider Model
Microsoft Enterprise Architecture Roundtable, 2014
Security Compliance Security Compliance
Figure: 2
I&O Support (servers,
hosting, upgrades
Conclusions
• Shadow IT efforts arise out of need, and point to a lack
of IT Services where they are not redundant
• Shadow IT efforts can point to how the organization
wants to use technology
• Shadow IT can extend functionality and provide value
without impacting the IT budget (initially)
• Rogue efforts can jump-start innovation
• Duplication of infrastructure, support, policy
compliance, security present challenges to the
organization
Recommendations
• Learn from the dark side; Shadow IT reveals real needs
• Consolidate where there’s duplication
• Cooperate where possible
• Enable the dark side via APIs and integration hubs while
protecting transactional integrity
• Don’t ignore security and compliance risks
Thank You
• Discussion
• Questions

More Related Content

What's hot

Why IT needs more IT Architects (IASA style)
Why IT needs more IT Architects (IASA style)Why IT needs more IT Architects (IASA style)
Why IT needs more IT Architects (IASA style)Paddy Baxter
 
Dell_KACE_User_Profile
Dell_KACE_User_ProfileDell_KACE_User_Profile
Dell_KACE_User_ProfileNancy Shepard
 
Presentation Leadership – Jobs vs. Sigman
Presentation Leadership – Jobs vs. SigmanPresentation Leadership – Jobs vs. Sigman
Presentation Leadership – Jobs vs. SigmanERC Consultants, Inc.
 
MT97 CIO People Strategy:  Creating a culture of engagement during times of g...
MT97 CIO People Strategy:  Creating a culture of engagement during times of g...MT97 CIO People Strategy:  Creating a culture of engagement during times of g...
MT97 CIO People Strategy:  Creating a culture of engagement during times of g...Dell EMC World
 
Thriving in an Environment of Change
Thriving in an Environment of ChangeThriving in an Environment of Change
Thriving in an Environment of ChangeNeeraj Bhatia
 
ITC Capabilities Brief 2012
ITC Capabilities Brief 2012ITC Capabilities Brief 2012
ITC Capabilities Brief 2012prdunn
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesDell World
 
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDon't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDatapipe
 
England 20181023 does18 usa
England 20181023 does18 usaEngland 20181023 does18 usa
England 20181023 does18 usaRob England
 

What's hot (11)

Why IT needs more IT Architects (IASA style)
Why IT needs more IT Architects (IASA style)Why IT needs more IT Architects (IASA style)
Why IT needs more IT Architects (IASA style)
 
Dell_KACE_User_Profile
Dell_KACE_User_ProfileDell_KACE_User_Profile
Dell_KACE_User_Profile
 
Presentation Leadership – Jobs vs. Sigman
Presentation Leadership – Jobs vs. SigmanPresentation Leadership – Jobs vs. Sigman
Presentation Leadership – Jobs vs. Sigman
 
MT97 CIO People Strategy:  Creating a culture of engagement during times of g...
MT97 CIO People Strategy:  Creating a culture of engagement during times of g...MT97 CIO People Strategy:  Creating a culture of engagement during times of g...
MT97 CIO People Strategy:  Creating a culture of engagement during times of g...
 
Thriving in an Environment of Change
Thriving in an Environment of ChangeThriving in an Environment of Change
Thriving in an Environment of Change
 
ITC Capabilities Brief 2012
ITC Capabilities Brief 2012ITC Capabilities Brief 2012
ITC Capabilities Brief 2012
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspaces
 
KTetreault IT
KTetreault ITKTetreault IT
KTetreault IT
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes MainstreamDon't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
Don't DYI your VDI: The Cloud-Hosted Desktop Goes Mainstream
 
England 20181023 does18 usa
England 20181023 does18 usaEngland 20181023 does18 usa
England 20181023 does18 usa
 

Viewers also liked

Nielsen Photography ~ A little Route 66
Nielsen Photography ~ A little Route 66Nielsen Photography ~ A little Route 66
Nielsen Photography ~ A little Route 66Shawn Nielsen
 
La acentuación
La acentuaciónLa acentuación
La acentuaciónfgmezlpez
 
様々な分野における対訳コーパスを用いた構文解析器の自己学習効果の検討
様々な分野における対訳コーパスを用いた構文解析器の自己学習効果の検討様々な分野における対訳コーパスを用いた構文解析器の自己学習効果の検討
様々な分野における対訳コーパスを用いた構文解析器の自己学習効果の検討奈良先端大 情報科学研究科
 
Digital transformation callforaction
Digital transformation callforactionDigital transformation callforaction
Digital transformation callforactionVincent Defour
 
Chinese Link Textbook Lesson 15 language in use
Chinese Link Textbook Lesson 15 language in useChinese Link Textbook Lesson 15 language in use
Chinese Link Textbook Lesson 15 language in useJoanne Chen
 
Kafka 0.9, Things you should know
Kafka 0.9, Things you should knowKafka 0.9, Things you should know
Kafka 0.9, Things you should knowRatish Ravindran
 
Troubleshooting Redis- DaeMyung Kang, Kakao
Troubleshooting Redis- DaeMyung Kang, KakaoTroubleshooting Redis- DaeMyung Kang, Kakao
Troubleshooting Redis- DaeMyung Kang, KakaoRedis Labs
 
'Hoe Service Excellent is uw organisatie?' - 15 oktober 2015
'Hoe Service Excellent is uw organisatie?' - 15 oktober 2015'Hoe Service Excellent is uw organisatie?' - 15 oktober 2015
'Hoe Service Excellent is uw organisatie?' - 15 oktober 2015Möbius Business Redesign
 
Machine Learning with Spark MLlib
Machine Learning with Spark MLlibMachine Learning with Spark MLlib
Machine Learning with Spark MLlibTodd McGrath
 
SAP REAL ESTATE
SAP REAL ESTATESAP REAL ESTATE
SAP REAL ESTATEeFM srl
 
Chinese Link Lesson 6 sentence patterns
Chinese Link Lesson 6 sentence patternsChinese Link Lesson 6 sentence patterns
Chinese Link Lesson 6 sentence patternsJoanne Chen
 
SOA & ESB Presentation
SOA & ESB PresentationSOA & ESB Presentation
SOA & ESB Presentationerichleipold
 
Chinese Link Lesson 22 worksheet 2017
Chinese Link Lesson 22  worksheet 2017Chinese Link Lesson 22  worksheet 2017
Chinese Link Lesson 22 worksheet 2017Joanne Chen
 
Chinese Link Textbook PPT Lesson 8 sentence patterns PowerPoint
Chinese Link Textbook PPT Lesson 8 sentence patterns PowerPointChinese Link Textbook PPT Lesson 8 sentence patterns PowerPoint
Chinese Link Textbook PPT Lesson 8 sentence patterns PowerPointJoanne Chen
 
Ariba and SAP Simple Finance – a Perfect Combination
Ariba and SAP Simple Finance – a Perfect CombinationAriba and SAP Simple Finance – a Perfect Combination
Ariba and SAP Simple Finance – a Perfect CombinationSAP Ariba
 
Disaster management with case study
Disaster management with case studyDisaster management with case study
Disaster management with case studyAkash Rana
 

Viewers also liked (19)

Nielsen Photography ~ A little Route 66
Nielsen Photography ~ A little Route 66Nielsen Photography ~ A little Route 66
Nielsen Photography ~ A little Route 66
 
Presentation1
Presentation1Presentation1
Presentation1
 
La acentuación
La acentuaciónLa acentuación
La acentuación
 
Presentation1
Presentation1Presentation1
Presentation1
 
様々な分野における対訳コーパスを用いた構文解析器の自己学習効果の検討
様々な分野における対訳コーパスを用いた構文解析器の自己学習効果の検討様々な分野における対訳コーパスを用いた構文解析器の自己学習効果の検討
様々な分野における対訳コーパスを用いた構文解析器の自己学習効果の検討
 
Digital transformation callforaction
Digital transformation callforactionDigital transformation callforaction
Digital transformation callforaction
 
Chinese Link Textbook Lesson 15 language in use
Chinese Link Textbook Lesson 15 language in useChinese Link Textbook Lesson 15 language in use
Chinese Link Textbook Lesson 15 language in use
 
Kafka 0.9, Things you should know
Kafka 0.9, Things you should knowKafka 0.9, Things you should know
Kafka 0.9, Things you should know
 
Troubleshooting Redis- DaeMyung Kang, Kakao
Troubleshooting Redis- DaeMyung Kang, KakaoTroubleshooting Redis- DaeMyung Kang, Kakao
Troubleshooting Redis- DaeMyung Kang, Kakao
 
'Hoe Service Excellent is uw organisatie?' - 15 oktober 2015
'Hoe Service Excellent is uw organisatie?' - 15 oktober 2015'Hoe Service Excellent is uw organisatie?' - 15 oktober 2015
'Hoe Service Excellent is uw organisatie?' - 15 oktober 2015
 
Man made disaster
Man made disasterMan made disaster
Man made disaster
 
Machine Learning with Spark MLlib
Machine Learning with Spark MLlibMachine Learning with Spark MLlib
Machine Learning with Spark MLlib
 
SAP REAL ESTATE
SAP REAL ESTATESAP REAL ESTATE
SAP REAL ESTATE
 
Chinese Link Lesson 6 sentence patterns
Chinese Link Lesson 6 sentence patternsChinese Link Lesson 6 sentence patterns
Chinese Link Lesson 6 sentence patterns
 
SOA & ESB Presentation
SOA & ESB PresentationSOA & ESB Presentation
SOA & ESB Presentation
 
Chinese Link Lesson 22 worksheet 2017
Chinese Link Lesson 22  worksheet 2017Chinese Link Lesson 22  worksheet 2017
Chinese Link Lesson 22 worksheet 2017
 
Chinese Link Textbook PPT Lesson 8 sentence patterns PowerPoint
Chinese Link Textbook PPT Lesson 8 sentence patterns PowerPointChinese Link Textbook PPT Lesson 8 sentence patterns PowerPoint
Chinese Link Textbook PPT Lesson 8 sentence patterns PowerPoint
 
Ariba and SAP Simple Finance – a Perfect Combination
Ariba and SAP Simple Finance – a Perfect CombinationAriba and SAP Simple Finance – a Perfect Combination
Ariba and SAP Simple Finance – a Perfect Combination
 
Disaster management with case study
Disaster management with case studyDisaster management with case study
Disaster management with case study
 

Similar to ShadowITPresentation

Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Priyanka Aash
 
Align technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessmentsAlign technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessmentsThe Spitfire Group
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and RewardChris Haddad
 
The Hartford IT Career Opportunities
The Hartford IT Career OpportunitiesThe Hartford IT Career Opportunities
The Hartford IT Career Opportunitieszstein2
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Simplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachSimplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachp6academy
 
Introduction to Competitive Intelligence Portals
Introduction to Competitive Intelligence PortalsIntroduction to Competitive Intelligence Portals
Introduction to Competitive Intelligence PortalsComintelli
 
Tableau Drive, A new methodology for scaling your analytic culture
Tableau Drive, A new methodology for scaling your analytic cultureTableau Drive, A new methodology for scaling your analytic culture
Tableau Drive, A new methodology for scaling your analytic cultureTableau Software
 
TechClimb_Webinar_PPT_working_1014
TechClimb_Webinar_PPT_working_1014TechClimb_Webinar_PPT_working_1014
TechClimb_Webinar_PPT_working_1014Laura J. Wilcox
 
Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Jeff Jakubiak
 
Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?Kris Shenk
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Daljit Banger
 
It Governance Slides for MISA Ontario June 2009
It Governance Slides for MISA Ontario June 2009It Governance Slides for MISA Ontario June 2009
It Governance Slides for MISA Ontario June 2009Ben Perry
 

Similar to ShadowITPresentation (20)

Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Align technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessmentsAlign technology and business with Enterprise Architecture assessments
Align technology and business with Enterprise Architecture assessments
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Chapter01
Chapter01Chapter01
Chapter01
 
The Hartford IT Career Opportunities
The Hartford IT Career OpportunitiesThe Hartford IT Career Opportunities
The Hartford IT Career Opportunities
 
Sample IT situation analysis/plan for Financial Services Firm
Sample IT situation analysis/plan for Financial Services FirmSample IT situation analysis/plan for Financial Services Firm
Sample IT situation analysis/plan for Financial Services Firm
 
CYBER SECURITY.pdf
CYBER SECURITY.pdfCYBER SECURITY.pdf
CYBER SECURITY.pdf
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Simplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachSimplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approach
 
Chapter01.ppt
Chapter01.pptChapter01.ppt
Chapter01.ppt
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
Introduction to Competitive Intelligence Portals
Introduction to Competitive Intelligence PortalsIntroduction to Competitive Intelligence Portals
Introduction to Competitive Intelligence Portals
 
Tableau Drive, A new methodology for scaling your analytic culture
Tableau Drive, A new methodology for scaling your analytic cultureTableau Drive, A new methodology for scaling your analytic culture
Tableau Drive, A new methodology for scaling your analytic culture
 
TechClimb_Webinar_PPT_working_1014
TechClimb_Webinar_PPT_working_1014TechClimb_Webinar_PPT_working_1014
TechClimb_Webinar_PPT_working_1014
 
Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?Who needs EA… when we have DevOps?
Who needs EA… when we have DevOps?
 
Structuring ECM
Structuring ECMStructuring ECM
Structuring ECM
 
Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?
 
Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World Enterprise Architecture - An Introduction from the Real World
Enterprise Architecture - An Introduction from the Real World
 
It Governance Slides for MISA Ontario June 2009
It Governance Slides for MISA Ontario June 2009It Governance Slides for MISA Ontario June 2009
It Governance Slides for MISA Ontario June 2009
 
Sadchap01
Sadchap01Sadchap01
Sadchap01
 

ShadowITPresentation

  • 1. Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table David Lavin, Ramit Luthra, Karun Pothacamury, Donald Stahl, Tom Valva October 16, 2014
  • 2. What is Shadow IT? • Shadow IT are those technology related activities that are not controlled and administered by the “official” centralized IT function • The centralized IT function believes that these activities are part of the IT organizations charter, and would normally be under its control
  • 3. What Drives Shadow IT? • Shadow IT groups desire to operate independently of the centralized IT function for various reasons: – Competitive drivers – Pressure to innovate – Availability of cloud services – Desire for independence – Enhanced productivity – Specialized domain knowledge – Control over the development life-cycle – Budget autonomy
  • 4. Types of Shadow IT • Practice driven • Rogue efforts • Purpose driven
  • 5. Types of Shadow IT – Practice Driven – In this model, a group that is part of a distinct practice within the organization performs its own technology management partially or entirely independently of the central IT organization
  • 6. Types of Shadow IT – Practice Driven • Legacy – Precedes the formulation of a mature IT organization – The group uses its own resources and expertise to create and/or adopt technology as needed – Groups were never considered a technology function – Distinct from the groups that traditionally used the first computer software – Often these are delivery-critical operational groups (warehouse management, media productions, sales) – Deal with technologies and vendors of which the IT organization has no hands-on experience, or operational knowledge
  • 7. Types of Shadow IT – Practice Driven • Organic – Strong focus on customer/consumer facing technologies. – Management of B2C web presences, mobile application development, and other public-facing technology assets for the business. – Driven by market pressures and competition; often part of marketing departments. – Centralized IT often lacks capabilities, particularly in the mobile design areas
  • 8. Types of Shadow IT – Practice Driven • Expert – Requires high degree of subject matter expertise; development must be tightly coupled with experts – Close client contact for customized solutions and complex algorithm development drives these groups to seek independence and control over development. – Often complex scientific or financial applications where traditional corporate IT resources cannot (or are perceived to not be able to) deliver.
  • 9. Types of Shadow IT – Rogue Efforts • Rogue efforts are those IT projects that are intentionally hidden or kept separate from the centralized IT organization • Rogue efforts may be sponsored or unsponsored • Rogue efforts use few IT resources from the centralized IT function
  • 10. Types of Shadow IT – Skunk Works – Skunk works are often sponsored – Frees engineers from ‘structured’ approach to foster innovation – If successful can be folded back into the centralized IT function
  • 11. Types of Shadow IT – Black Ops • Unsponsored efforts • Usually smaller than skunk works projects • Often driven by frustration with IT and backlogs • May be of limited scope and use • May go undetected for years
  • 12. Types of Shadow IT – Purpose Driven – Productivity needs are often the drivers of Purpose Driven efforts – Often extensions to formal IT systems – Frequently enabled by desktop technologies – Often discovered when problems occur requiring IT intervention – Cloud SaaS offerings encourage Purpose Driven efforts
  • 13. Pros and Cons of Shadow IT Practice Driven Pros: - Better business alignment - Unique value - Natural agility Practice Driven Cons: - Infrastructure duplication - Compliance Risk
  • 14. Pros and Cons of Shadow IT Rogue Effort Pros: - Highly innovative, creative - Dedicated teams focus intensely - Natural agility Rogue Effort Cons: - Compliance & security Risk - Lack of support - Initial success may not scale - May lack broad application
  • 15. Pros and Cons of Shadow IT Purpose Driven Pros: - Often improve productivity - Extend existing systems capabilities - Can point to integration opportunities - Don’t initially impact IT budget Purpose Driven Cons: - May eventually require IT support - Duplication of effort - Compliance Risk
  • 16. Purpose Driven Efforts Rogue Efforts Practice Driven Efforts Traditional IT Services • Traditional IT provides some but not all services, such as email, networking, directory and authentication. • Rogue efforts tend to use a minimum IT services • Practice and Purpose driven tend to use more services, such as server provisioning, but not application development and/or support Figure: 1 Intersection of Traditional and Shadow IT
  • 17. Architecture & Database Design Purpose Driven Practice Driven Traditional IT Rogue Development Requirements Analysis Quality Assurance User Acceptance Testing (UAT) Software Development Requirements Analysis Quality Assurance User Acceptance Testing (UAT) Software Development Architecture & Database Design Requirements Analysis Security Compliance Quality Assurance User Acceptance Testing (UAT) Software Development Architecture & Database Design Requirements Analysis I&O Support (servers, hosting, upgrades) Security Compliance Quality Assurance User Acceptance Testing (UAT) Software Development Non-IT Developers, Testers, Architects, Analysts, SMEs IT Developers, Testers, Architects, Analysts, DBAs IT Infrastructure and Operations AnalystsIndependent SaaS, PaaS, vendors, closets, etc. IT Security AnalystsIndependent Security Analysts, disregarded I&O Support (servers, hosting, upgrades I&O Support (servers, hosting, upgrades Architecture & Database Design Architecture & Database Design Architecture & Database Design Service Providers: Shadow IT Service Provider Model Microsoft Enterprise Architecture Roundtable, 2014 Security Compliance Security Compliance Figure: 2 I&O Support (servers, hosting, upgrades
  • 18. Conclusions • Shadow IT efforts arise out of need, and point to a lack of IT Services where they are not redundant • Shadow IT efforts can point to how the organization wants to use technology • Shadow IT can extend functionality and provide value without impacting the IT budget (initially) • Rogue efforts can jump-start innovation • Duplication of infrastructure, support, policy compliance, security present challenges to the organization
  • 19. Recommendations • Learn from the dark side; Shadow IT reveals real needs • Consolidate where there’s duplication • Cooperate where possible • Enable the dark side via APIs and integration hubs while protecting transactional integrity • Don’t ignore security and compliance risks