SlideShare a Scribd company logo
The Business Value of
Shadow IT
Shadow IT is on the Rise
30% of employees use file
sharing and collaboration
tools without IT approval
23% of employees use enterprise-focused
social networking tools without IT approval
Source: “IDG Enterprise Consumerization of IT in the Enterprise Study 2014.” IDG Enterprise. March 20, 2014.
Only 8% of companies
know the extent of
shadow IT in their
organizations, while
72% report that they
don’t know the extent of
shadow IT but want to.
What’s Lurking in the Shadows
of your Organization?
Source: “Cloud Adoption Practices & Priorities Survey Report.” Cloud Security Alliance. January 2015.
The Dark Side of Shadow IT
By nature, shadow applications are not
integrated into your enterprise technology
stacks. This results in:
● Missed opportunities
to communicate
information between
applications
● Less effective
application
management
The Dark Side of Shadow IT
Shadow IT also puts corporate data at risk.
It can result in:
● Loss of valuable
corporate data when
employees leave and
terminate an
application
● Failure to comply
with corporate
security policies
How Do These Risks Impact IT?
The security landscape has changed.
By 2020, 60% of enterprises’ information
security budgets will be allocated for rapid
detection and response approaches, up
from less than 10% in 2012.
Source: Scholtz, Tom. “Information Security and the Dark Side of the Digital Workplace.” Gartner. August 19,
2015
What’s IT to Do?
Shadow IT no doubt has
its downsides and can
pose serious risks.
But whether we like it or not, shadow IT is here to stay.
Bringing Shadow IT into the Light
Embracing shadow IT
in your business is the
key to success.
Shadow IT can be Good for Business
Users who engage in shadow IT typically do
so with the intention to do their jobs better.
Paying attention to
shadow IT behavior
to identify user needs
Encouraging users
to find new ways to
work smarter
Added business value
The True Value of Shadow IT
When managed properly,
shadow IT helps add value by:
● Improving the working experience for internal
customers
● Increasing productivity and flexibility
● Empowering users to act as decision makers in
solving their daily challenges
● Providing IT with firsthand insight into user needs
Learn next steps for
managing shadow IT:
Download the White Paper
Finding a Place for Shadow IT
in the Enterprise

More Related Content

What's hot

Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote
itSMF UK
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
AIIM International
 
Canon Infographic on workplace evolution
Canon Infographic on workplace evolution Canon Infographic on workplace evolution
Canon Infographic on workplace evolution
Benn Probett
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
RES
 
File (26)
File (26)File (26)
File (26)
lilfato
 
Transforming the digital experience of your workforce
Transforming the digital experience of your workforceTransforming the digital experience of your workforce
Transforming the digital experience of your workforce
RES
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
Economic Alliance of Kankakee County
 
20180808 How Modern Records Management Practices are Essential for Businesses...
20180808 How Modern Records Management Practices are Essential for Businesses...20180808 How Modern Records Management Practices are Essential for Businesses...
20180808 How Modern Records Management Practices are Essential for Businesses...
Jesse Wilkins
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
RES
 
Trends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportTrends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision Support
Corporacion Colombia Digital
 
Aligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with TechnologyAligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with Technology
InnoTech
 
What is Enterprise Service Management and How You Can Get Started
What is Enterprise Service Management and How You Can Get StartedWhat is Enterprise Service Management and How You Can Get Started
What is Enterprise Service Management and How You Can Get Started
Cherwell Software
 
The Future of the Help Desk
The Future of the Help DeskThe Future of the Help Desk
The Future of the Help Desk
Rich Rubinstein
 
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be InnovatingAre Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
RES
 
10 Hottest trends in corporate digitisation
10 Hottest trends in corporate digitisation10 Hottest trends in corporate digitisation
10 Hottest trends in corporate digitisation
Fuji Xerox Asia Pacific
 
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital WorkforceI Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
RES
 
Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15
Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15
Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15James Rutt
 

What's hot (18)

Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
 
Canon Infographic on workplace evolution
Canon Infographic on workplace evolution Canon Infographic on workplace evolution
Canon Infographic on workplace evolution
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
 
File (26)
File (26)File (26)
File (26)
 
New Ways to Take Full Advantage
New Ways to Take Full AdvantageNew Ways to Take Full Advantage
New Ways to Take Full Advantage
 
Transforming the digital experience of your workforce
Transforming the digital experience of your workforceTransforming the digital experience of your workforce
Transforming the digital experience of your workforce
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
 
20180808 How Modern Records Management Practices are Essential for Businesses...
20180808 How Modern Records Management Practices are Essential for Businesses...20180808 How Modern Records Management Practices are Essential for Businesses...
20180808 How Modern Records Management Practices are Essential for Businesses...
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
Trends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportTrends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision Support
 
Aligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with TechnologyAligning Corporate Business Goals with Technology
Aligning Corporate Business Goals with Technology
 
What is Enterprise Service Management and How You Can Get Started
What is Enterprise Service Management and How You Can Get StartedWhat is Enterprise Service Management and How You Can Get Started
What is Enterprise Service Management and How You Can Get Started
 
The Future of the Help Desk
The Future of the Help DeskThe Future of the Help Desk
The Future of the Help Desk
 
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be InnovatingAre Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
 
10 Hottest trends in corporate digitisation
10 Hottest trends in corporate digitisation10 Hottest trends in corporate digitisation
10 Hottest trends in corporate digitisation
 
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital WorkforceI Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
 
Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15
Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15
Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15
 

Similar to The Business Value of Shadow IT

Bringing Shadow IT Into the Light
Bringing Shadow IT Into the LightBringing Shadow IT Into the Light
Bringing Shadow IT Into the Light
Jennifer Stern
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
VARINDIA
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
Pablo Junco
 
Shadow IT
Shadow ITShadow IT
Shadow IT
PriyaPandey162
 
Slides: Empowering Data Consumers to Deliver Business Value
Slides: Empowering Data Consumers to Deliver Business ValueSlides: Empowering Data Consumers to Deliver Business Value
Slides: Empowering Data Consumers to Deliver Business Value
DATAVERSITY
 
Digital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityDigital Transformation & Cloud Profitability
Digital Transformation & Cloud Profitability
Gui Carvalhal
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
Bitzer Mobile, now part of Oracle
 
How Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising StatsHow Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising Stats
The Cloud Communications division of NTT Ltd.
 
Top data science and AI trends to watch out for in 2021 | AIM & AnalytixLabs
Top data science and AI trends to watch out for in 2021 | AIM & AnalytixLabsTop data science and AI trends to watch out for in 2021 | AIM & AnalytixLabs
Top data science and AI trends to watch out for in 2021 | AIM & AnalytixLabs
Srishti Deoras
 
Top Trends & Predictions That Will Drive Data Science in 2022.pdf
Top Trends & Predictions That Will Drive Data Science in 2022.pdfTop Trends & Predictions That Will Drive Data Science in 2022.pdf
Top Trends & Predictions That Will Drive Data Science in 2022.pdf
Data Science Council of America
 
Daniel Benton, Managing Director at Accenture - High performers in IT
Daniel Benton, Managing Director at Accenture - High performers in ITDaniel Benton, Managing Director at Accenture - High performers in IT
Daniel Benton, Managing Director at Accenture - High performers in IT
Global Business Events
 
GARTNER_top_consumer_trends_
GARTNER_top_consumer_trends_GARTNER_top_consumer_trends_
GARTNER_top_consumer_trends_Stan Dacre
 
Webinar for Apr 2019 - AI Powered Insurer
Webinar for Apr 2019 - AI Powered InsurerWebinar for Apr 2019 - AI Powered Insurer
Webinar for Apr 2019 - AI Powered Insurer
The Digital Insurer
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
Conor Bronsdon
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
Pablo Junco
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?
Cygnet Infotech
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?
Hemang Rindani
 
IOT in Enterprises | AuroIN
IOT in Enterprises | AuroINIOT in Enterprises | AuroIN
IOT in Enterprises | AuroIN
AuroIN
 
IOT in Enterprises
IOT in EnterprisesIOT in Enterprises
IOT in Enterprises
AuroIN
 
India's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfIndia's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdf
insightssuccess2
 

Similar to The Business Value of Shadow IT (20)

Bringing Shadow IT Into the Light
Bringing Shadow IT Into the LightBringing Shadow IT Into the Light
Bringing Shadow IT Into the Light
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Slides: Empowering Data Consumers to Deliver Business Value
Slides: Empowering Data Consumers to Deliver Business ValueSlides: Empowering Data Consumers to Deliver Business Value
Slides: Empowering Data Consumers to Deliver Business Value
 
Digital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityDigital Transformation & Cloud Profitability
Digital Transformation & Cloud Profitability
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
How Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising StatsHow Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising Stats
 
Top data science and AI trends to watch out for in 2021 | AIM & AnalytixLabs
Top data science and AI trends to watch out for in 2021 | AIM & AnalytixLabsTop data science and AI trends to watch out for in 2021 | AIM & AnalytixLabs
Top data science and AI trends to watch out for in 2021 | AIM & AnalytixLabs
 
Top Trends & Predictions That Will Drive Data Science in 2022.pdf
Top Trends & Predictions That Will Drive Data Science in 2022.pdfTop Trends & Predictions That Will Drive Data Science in 2022.pdf
Top Trends & Predictions That Will Drive Data Science in 2022.pdf
 
Daniel Benton, Managing Director at Accenture - High performers in IT
Daniel Benton, Managing Director at Accenture - High performers in ITDaniel Benton, Managing Director at Accenture - High performers in IT
Daniel Benton, Managing Director at Accenture - High performers in IT
 
GARTNER_top_consumer_trends_
GARTNER_top_consumer_trends_GARTNER_top_consumer_trends_
GARTNER_top_consumer_trends_
 
Webinar for Apr 2019 - AI Powered Insurer
Webinar for Apr 2019 - AI Powered InsurerWebinar for Apr 2019 - AI Powered Insurer
Webinar for Apr 2019 - AI Powered Insurer
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?
 
IOT in Enterprises | AuroIN
IOT in Enterprises | AuroINIOT in Enterprises | AuroIN
IOT in Enterprises | AuroIN
 
IOT in Enterprises
IOT in EnterprisesIOT in Enterprises
IOT in Enterprises
 
India's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfIndia's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdf
 

Recently uploaded

Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

The Business Value of Shadow IT

  • 1. The Business Value of Shadow IT
  • 2. Shadow IT is on the Rise 30% of employees use file sharing and collaboration tools without IT approval 23% of employees use enterprise-focused social networking tools without IT approval Source: “IDG Enterprise Consumerization of IT in the Enterprise Study 2014.” IDG Enterprise. March 20, 2014.
  • 3. Only 8% of companies know the extent of shadow IT in their organizations, while 72% report that they don’t know the extent of shadow IT but want to. What’s Lurking in the Shadows of your Organization? Source: “Cloud Adoption Practices & Priorities Survey Report.” Cloud Security Alliance. January 2015.
  • 4. The Dark Side of Shadow IT By nature, shadow applications are not integrated into your enterprise technology stacks. This results in: ● Missed opportunities to communicate information between applications ● Less effective application management
  • 5. The Dark Side of Shadow IT Shadow IT also puts corporate data at risk. It can result in: ● Loss of valuable corporate data when employees leave and terminate an application ● Failure to comply with corporate security policies
  • 6. How Do These Risks Impact IT? The security landscape has changed. By 2020, 60% of enterprises’ information security budgets will be allocated for rapid detection and response approaches, up from less than 10% in 2012. Source: Scholtz, Tom. “Information Security and the Dark Side of the Digital Workplace.” Gartner. August 19, 2015
  • 7. What’s IT to Do? Shadow IT no doubt has its downsides and can pose serious risks. But whether we like it or not, shadow IT is here to stay.
  • 8. Bringing Shadow IT into the Light Embracing shadow IT in your business is the key to success.
  • 9. Shadow IT can be Good for Business Users who engage in shadow IT typically do so with the intention to do their jobs better. Paying attention to shadow IT behavior to identify user needs Encouraging users to find new ways to work smarter Added business value
  • 10. The True Value of Shadow IT When managed properly, shadow IT helps add value by: ● Improving the working experience for internal customers ● Increasing productivity and flexibility ● Empowering users to act as decision makers in solving their daily challenges ● Providing IT with firsthand insight into user needs
  • 11. Learn next steps for managing shadow IT: Download the White Paper Finding a Place for Shadow IT in the Enterprise