IDG Contributor Network: Is shadow IT something CIOs should worry about?

Pervasiveness of shadow IT

I talked to several CIOs in the #CIOChat recently about shadow IT.Their collective wisdom is shared in this post. The first thing that impressed me in this chat is that the CIOs know the numbers. CIOs shared what they had learned from Cisco, Gartner, and Brocade. Cisco found that shadow cloud use was greater than 15 times higher than estimated by CIOs. CIOs said that Gartner’s research found that more than 40 percent of IT spend is in fact shadow IT. And Brocade, which did a global survey of 200 CIOs, found that more than 80 percent had seen some form of unauthorized cloud/SaaS usage.

Does the presence of shadow IT make a statement?

I asked the CIOs whether the presence of shadow IT makes a statement about business/IT alignment. CIOs had a wide range of answers to this question. CIOs said that often the real problem is not shadow IT but why and how shadow IT emerged. CIOs suggest that in many cases, shadow IT is in fact a symptom of unmet needs. It can as well imply a perceived lack of speed for IT versus the needs of the business.

To read this article in full or to leave a comment, please click here

CIO Cloud Computing

ManagedMethods brings shadow IT and shadow data into the light

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  

At the recent Gartner Security & Risk Management Summit, Gartner VP Neil MacDonald spoke about the technology trends for 2016 that provide the most effective business support and risk management. Cloud Access Security Brokers (CASBs) are number one on the list. According to Gartner, companies’ use of Software as a Service (SaaS) applications create new challenges to security teams due to limited visibility and control options. CASBs enable businesses to apply much-needed security policies across multiple cloud services.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

CIOs: Shadow IT is actually great for your cloud strategy

In a survey, cloud security broker vendor CipherCloud found that 86 percent of cloud applications used at workplaces are unsanctioned. That’s a pretty big percentage. Obviously, the security vendors have an incentive to raise such fears about shadow IT, so take this claim with much salt. However, the issue merits attention.

I don’t see shadow IT as that big of deal. Moreover, I believe that CIOs can embrace, rather than fight, the rise of shadow IT for their own benefit. How?

There are three benefits to the CIO from departments’ shadow cloud use.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

CIOs: Shadow IT is actually great for your cloud strategy

In a survey, cloud security broker vendor CipherCloud found that 86 percent of cloud applications used at workplaces are unsanctioned. That’s a big percentage. Obviously, the security vendors have an incentive to raise such fears about shadow IT, so take this claim with much salt. However, the issue merits attention.

I don’t see shadow IT as that big of deal. Moreover, I believe that CIOs can embrace, rather than fight, the rise of shadow IT for their own benefit. How?

There are three benefits to the CIO from departments’ shadow cloud use.

To read this article in full or to leave a comment, please click here

InfoWorld Cloud Computing

IBM tackles ‘shadow IT’ with a new cloud security tool for enterprises

If there’s one thing that can strike terror into a CIO’s heart, it’s the security implications of the cloud; if there’s another, it’s the “bring your own” technology trend. Combine the two, and you’ve got the motivation behind IBM’s new Cloud Security Enforcer.

Thanks to having set up used a private email server while U.S. Secretary of State, Hillary Clinton has become a poster child for “shadow IT,” or the phenomenon by which employees bring their own technologies into the workplace, but there’s no denying its prevalence. One-third of Fortune 1000 employees share and upload corporate data on third-party cloud apps, according to a recent IBM Security study. One in four link to cloud apps using a corporate log-in and password.

To read this article in full or to leave a comment, please click here

CIO Cloud Computing