Shadow IT — Enterprise IT’s love/hate relationship

  1. How much is the upgrade going to cost me? Does it consume more fuel?
  2. Is this upgrade even legal?
  3. Will this vehicle be controllable?
  1. Wasted technology spending
  2. Legal ramification due to breach of IT governance requirements
  3. Loss of productivity due to overlapping system capabilities
  4. Security vulnerabilities
  1. Reduced costs when consolidated under an enterprise contract
  2. Reduced security risks and attack surfaces
  3. Compliance with IT governance requirements
Shadow IT Management Process — www.plutora.com
  1. Discover and Identify — The first step is to improve your business's ability to detect non-compliant technology. This can be done by implementing monitoring tools such as ManageEngine
  2. Evaluate and Analyse — At this point, you or your IT team can begin to identify compliance risks and benefits of the technology. During this phase if the technology is identified that cannot hold up to your business's compliance requirements, usage of this technology can be banned/blocked. On the other hand, if the technology could be compliant, it might be beneficial to adopt it.
  3. Manage and Continuous Monitoring — Managing the technology could mean adopting the technology into your list of compliant technologies. This could include adopting enterprise-level contracts to reduce costs, enabling integrations with the compliant systems to improve interoperability, virtualising the technology to increase security, and adding single-sign-on to improve productivity.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Kinetics Software

Kinetics Software

Kinetics is an adaptive workspace for your team to collaborate & scale seamlessly with technology.