Shadow IT: Getting the visibility you need
A recent CIO survey found that on average, most IT leaders believed they had only 30-40 apps running on their network—when in reality that number was over 900. The danger of that unknown could be exposing your company data and eating up as much as 40-50% of your IT budget, according to Gartner and Everest Group. Can the challenges of unsanctioned cloud applications be stopped? Here’s a quick guide to shadow IT and how to handle the blind spots.
What is shadow IT?
Shadow IT is a term used to describe SaaS applications and cloud-based systems and services (think PaaS, and IaaS) implemented and used without explicit approval from the corporate IT department. It refers to the unauthorized cloud applications running on your network that the IT team knows nothing about. Similarly “stealth IT” describes solutions implemented by departments other than IT.
Ideally, IT departments provide guidance to the corporate enterprise on technology solutions, systems, and services, helping them create a controlled and secure IT environment. But the cloud and shadow IT issues shatter that ideology. Today, every employee with a device and a credit card can threaten the security of the corporate IT environment just by conducting business as usual.
Shadow IT dilemmas
Shadow IT has benefits but also comes with serious security consequences.
SaaS applications are considered an important source for employee productivity and innovation, and the widespread availability of them can create rapid service deployment at lower costs without the IT team taking on the burden of service deployment. These services help departments be more agile, responding to changes rapidly and gaining access to resources that help them be competitive. But many times company data (and much more) is at stake.
Ultimately, shadow IT is a competitor to the internal IT operations and services, and is known to come with these risks:
- The IT Network at Risk: Shadow IT creates security vulnerabilities when employees share company and customer data via cloud apps. IT networks can be at risk because of the external collaborations that are part of shadow IT. Depending on how a department uses these applications and how it shares corporate and customer data with it, collaboration can open the door to cybersecurity threats.
- Data Exposure: Even when the service is free, there will be some way that the provider monetizes the service. In some cases, the user’s information may be sold and/or used for advertising. The software download for service access may contain tracking and reporting technology as well as cookies that are otherwise blocked by the organization’s system. This may seem harmless, but it presents one of the main problems with shadow IT. It could enable internal or sensitive information to be viewed by external organizations.
- Loss of Control and Compliance: Shadow IT solutions may not align with an organization’s requirements for control, documentation, security, reliability, etc. Both security and compliance regulations often cause organizations to implement restrictions, policies, and procedures that many consider inconvenient. The average shadow IT user may not know of these requirements, and therefore may overlook them. Furthermore, the user may be aware of these requirements but find that they impede their work, actively seeking to thwart or work around them.
- Performance and Budget Challenges: Shadow IT can drain financial resources away from IT and can lead to service problems that occur outside IT’s control–as users don’t always have the necessary technical and contractual expertise when deploying shadow IT applications.
The most dangerous threat, however, is the issue of scope awareness. For most, the shadow IT problem is far worse than they recognize. Remember that statistic from the CIO survey that says most have 888+ unknown apps running on their network? In highly-regulated industries such as healthcare and financial services, there were 20X more cloud apps than originally estimated. Furthermore, the cost of remediation can be significant. Gartner found that investments in shadow IT controls can exceed 40% of IT spending, and research from the Everest Group found that it comprises 50% or more.
Shadow IT: Why it’s not going away
Many factors continue to drive the shadow IT problem including:
- Enterprises across all industries are embracing the cloud as they migrate to popular enterprise cloud services. SaaS, PaaS, and IaaS are known for improving business, delivering greater productivity and innovation.
- Solutions can be implemented almost instantaneously, without the need to wait for IT. IT organizations are dealing with legacy infrastructure and management challenges, meaning they cannot rapidly offer or budget for new services. These deficiencies lead departments to subscribe to outside services.
- Services are often cheap and some are even free – which creates the perception that shadow IT is a cheaper alternative. Besides, there are plenty of competing services all offering OPEX payment models that are priced competitively.
- A particular solution might have nice features and functions that are not offered by the enterprise IT department.
- Users want direct control over their IT services.
So, can the cloud app problem be stopped?
Handling shadow IT: Getting the visibility you need
With today’s easy access to SaaS applications, it’s virtually impossible to prevent shadow IT. Instead, technologies, policies, and processes should be in place to create checks and balances. All cloud applications must be identified, monitored, and managed from a security perspective.
Visibility is the first step, as IT departments require deep network visibility to understand the list of applications and services operating in their IT environment. The key is to eliminate the guesswork needed to identify unauthorized cloud application usage and to gain the insight needed without the added cost of purchasing a variety of endpoint security solutions.
Secondarily, IT needs usage statistics. With the comprehensive list and clarity on which applications are most popular, you can adequately delineate the known and unknown applications, addressing unsanctioned ones using a prioritized approach.
These questions and insights can help guide your risk mitigation plan:
- Which shadow IT apps are the most popular and what are the employee usage statistics?
- What is the risk level of each shadow IT application or service? Which services store sensitive or confidential data? Collaboration, file sharing, and data storage apps are more likely to be high-risk apps.
- How effective are the cloud security, privacy, and compliance procedures for enforcing acceptable cloud use policies?
- Which business partners’ cloud services are employees accessing, and at what risk?
- Are there redundant services in use that are introducing additional cost and risk or inhibiting productivity?
When an IT department can get the application visibility and usage statistics all within the same network management portal it uses every day, creating a governance system for shadow IT becomes a simple part of IT management. Masergy’s Managed SD-WAN is one such service. Learn more about Masergy’s Shadow IT Discovery solution.
For more information on this topic, the IEEE produced a detailed article, “Shadow IT Evaluation Model,” which includes an in-depth discussion of how to evaluate shadow IT.
SD-WAN? We're here to answer all of your questions.
Call us now to arrange a consultation (866) 588-5885.
Or arrange for a consultation through our request form.
How does Cloud Access Security Broker (CASB) fit into the SASE paradigm?
CASB serves as of one of SASE’s fundamental purposes. Here’s how it works within a SASE framework to mitigate security risks.
SASE from Masergy: Best-of-breed technologies, broad choices, and security that goes beyond SASE
Here’s a look at Masergy’s approach to SASE, the enhancements we have made, and how we’re leaning into network-security convergence.
Masergy Strengthens Its SD-WAN Secure Solution with Deeper SASE Capabilities
Masergy, the software-defined network and cloud platform for the digital enterprise, announced that it is strengthening its SD-WAN Secure solution to offer Secure Access Service Edge (SASE) capabilities
Masergy Receives Frost & Sullivan Technology Innovation Leadership Award for Managed SD-WAN Solution with AIOps
Masergy Named Most Innovative Managed SD-WAN Service Provider by Frost & Sullivan
What lies beyond SASE?
Do SASE solutions reach far enough? Here’s a look at what’s inside the SASE framework today, and where it could go in the future.
The permanency of remote healthcare calls for UCaaS + SD‑WAN + Security
Healthcare IT leaders are reducing the complexity of digital transformation by addressing UC, the network, and security in one unified strategy.
Can I skip SD-WAN and jump straight to SASE?
Want to switch from SD-WAN to SASE midstream? These RFP questions can help you roll your IT modernization project into a larger investment.
The future of the network is autonomous: WFH strategies prepare for self-driving networks
While IT leaders are enabling the remote workforce, they are also building an autonomous network. Leverage your investments today for innovation tomorrow.
What are the benefits of SASE?
Why do businesses need SASE and more importantly does it help with work from home? Here’s how SASE solutions deliver real value.
Masergy Launches SD-WAN Work From Anywhere Solutions
Masergy Launches SD-WAN Work From Anywhere Solutions, which extend the value of Masergy SD-WAN Secure to Home and Mobile Users
How do you tease out the differences in SASE solutions? Tech stacks set providers apart
Planning a move toward SASE? Here are three ways to make apples-to-apples comparisons, teasing out the differences in solutions.
SASE from Fortinet & Masergy: Converging best-of-breed network and security solutions recognized by Gartner
SASE is consolidating best-of-breed technologies into one cloud service, and it’s here where the Masergy-Fortinet offering stands above the rest.
Is there more than one way to SASE? Cloud separates two strategies, schools of thought
Are firewalls becoming a dividing line between SASE strategies? Why some IT leaders choose a cloud-managed approach over a cloud-native one.
Is SASE real or just a concept?
When it comes to SASE validity, there are lots of opinions. Here’s a look from all sides and tips for how to evaluate SASE architecture.
Masergy Named Most Innovative Managed SD-WAN Service Provider by Frost & Sullivan
Masergy Announces Zenith Partner of the Year Awards
Co-managed SD-WAN: IT decision makers are leaning in but how do you get the best of both worlds?
What’s the difference between a fully managed SD-WAN service and a co-managed service? Here’s how to get the best out of shared responsibilities.
Why are there so many different interpretations of SASE?
Ask people what SASE is and you’ll likely get 10 answers. While the newness of SASE is a factor in the confusion, here’s what SASE is and what it’s not.
Masergy SD-WAN wins Leading Lights 2020 Award for Most Innovative SD-WAN Service
Masergy releases 2020 SD-WAN Market Trends Report
IDG study finds SD-WAN as key enabler for working from anywhere
Data shows remote work has triggered a modernization of business operations and the network. Explore the highlights from the new IDG study.
The business case for Masergy’s new SD-WAN Secure solutions
Masergy’s new SD-WAN portfolio gives companies of every size unrivaled application performance along with more flexibility and choice.
Masergy launches new Partner Program for accelerated SD-WAN market
Masergy launches SD-WAN enhancements: More options and trailblazing SLAs meet the needs of any transforming business
Masergy expands its SD-WAN portfolio offering the broadest choice, flexibility, and built-in SASE
Masergy announces the SD‑WAN industry’s most competitive Service Level Agreements
Work-from-Anywhere Study: ZK Research webinar explores IT trends and SD-WAN urgency
ZK Research data shows IT spending is up, and the value of the network has increased. Don’t miss the latest SD-WAN strategies in this online event.
Oldcastle infrastructure selects Masergy SD-WAN to build high-availability network for digital transformation
SD-orchestration: SD-WAN and application performance management
SD-WAN has redefined network management, and how you deploy it can impact success. Get the six elements of SD-orchestration and key considerations.
WAN automation: Why SD‑WAN is only step one and what’s needed to reach full autonomy
Networks are on their way to becoming “self-driving.” Understand the current state of networking automation and what’s needed to reach full autonomy.
Elements of SD-WAN & SASE platforms: Differentiators, characteristics and the hidden secret
SD-WAN solutions are now platforms, but what does that mean? Moreover, what differentiates platforms from solution sets? Here’s the hidden secret.
5G and fixed wireless: Where does it fit in your SD-WAN connectivity strategy?
With SD-WAN’s many connectivity options, when do you deploy 4G and 5G links and when should you avoid them? Here’s how Masergy advises its clients.
COVID-19 is changing how IT thinks about MPLS: What networks and leaders need now
The idea of converting all your private network connections into public ones is being challenged. Attitudes are shifting. Here’s what it shows us.
What digital transformation looks like now: Omdia webinar has the outlook for Europe
Research from European enterprises surveyed as the pandemic lockdown began helps IT leaders identify new trends and what businesses need now.
Extending secure SD-WAN to secure SD-Branch: The convergence of WAN and LAN at the edge
SD-WAN is giving way for terms like SD-Branch. Understand the benefits and how SD-Branch is addressing security challenges at the network edge.
Network security and automation: Why you need user identity analytics now
Here’s a guide to understanding the value of user identity analytics and why these details are increasingly important for security today and network automation tomorrow.
Advancing SD-WAN security and control, Masergy introduces identity-based WAN analytics
SD-WAN management portals typically track only IP traffic for entire sites, but Masergy’s SD-WAN gives you per-user analytics as a standard offering.
The autonomous enterprise: Building your digital vision
Masergy's CTO, Chris MacFarland, teaches you how to reach the milestone of true autonomy. This article originally appeared in Forbes.
The impact of COVID-19 on corporate networks: VPN connections skyrocket, increasing by 676%
See how Masergy’s network is changing in light of Coronavirus. Get tips for fast VPNs and understand shifts in digital transformation priorities.
COVID-19: Prioritizing health & safety
Learn how Masergy is acting with urgency to protect employees, clients, and business continuity. We explain how Masergy helps clients respond and how he virtualized the company.
Masergy wins Stevie® award for Sales & Customer Service
How security threats are evolving now: the cause and effect on security strategy
How do you keep up with advanced threats? Explore the causes behind more frequent attacks and the assumptions your security strategy needs to make now.
20 things you didn’t know about Masergy
With 20 years of history, Masergy is full of fun factoids. Explore the pioneering moments, pivotal transformations, and tales from the startup days.
4-time Visionary: Gartner positions Masergy as Visionary in 2020 Magic Quadrant for Network Services, Global
Get a free copy of Gartner's report. Learn how Masergy pioneered software-defined networks and is building the autonomous networks of tomorrow.
How SD-WAN is converging network, security and AI
Many technologies are uniting under SD-WAN. Learn what’s changed and why new additions are starting to look like autonomous networking.
Masergy celebrates 20 years of success marked by service excellence and early SD-WAN innovation
Masergy’s biggest innovation milestones
2020 marks Masergy’s 20th anniversary. The celebration starts with our top innovation landmarks and where we’re going next.
Small beginnings, big impact: Terry Traina reflects on Masergy’s legacy
In celebration of Masergy’s 20th anniversary, we’re honoring our greatest leaders and key players. Here’s the story of Terry Traina, Masergy’s Chief Digital Officer.
Scrappy startup delivers leading network performance: Mark McCann explains Masergy’s early innovation
3 common problems with security services and what you should be getting
Are you getting value out of your security services? These frequent pain points illustrate how partners should be strengthening your security posture.
Masergy AIOps wins 2020 BIG Innovation award
Harnessing the power of AIOps: Paving the way to autonomous networking
AIOps puts a virtual network engineer on your team, but it’s also paving the way for autonomous networking. Get the requirements and four next steps.
Fortinet & Masergy: The security-driven approach to SD-WAN
Here’s a fully managed SD-WAN solution that helps organizations truly transform the WAN edge with a security-driven approach.