SlideShare a Scribd company logo
2
Most read
10
Most read
13
Most read
Bringing IT 
out of the shadows
What is Shadow IT? 
The act of purchasing or using technology for the 
workplace without the approval or knowledge of the IT 
department is called Shadow IT.
Examples 
• DevOps team purchasing an instance of a caching 
server to balance load bypassing IT in order to not 
have users suffer downtime 
• Sales team sharing crucial customer data, even 
internally, using a personal account of Google Drive 
• Using an unauthorised pen drive. Yep!
WHY DOES THIS HAPPEN? 
• IT Department is considered slow and bureaucratic by 
business units in some organizations. 
• With the market moving at breakneck speed, business 
units don’t want to wait for IT to fulfil service 
requests. 
• Overzealous employees with (mostly) good intentions 
Why does this happen?
The catalysts 
• Cloud technology 
• eCommerce 
• Tech savvy credit card toting managers 
• Consumerization of technology
Is the practice of Shadow IT bad? 
Business says 
NO. 
IT says 
YES.
Business IT 
We 
don’t 
have 
,me 
to 
fill 
forms 
If 
you 
don’t 
fill 
forms, 
there 
will 
be 
miscommunica,on 
We 
can 
do 
our 
own 
tech 
research, 
thank 
you. 
We 
do 
that 
too. 
And 
we 
are 
paid 
to 
do 
it. 
IT 
is 
s,ll 
stuck 
in 
with 
80s 
soBware. Stable 
soBware, 
anyone? 
We 
have 
the 
latest 
soBware 
at 
our 
finger,ps 
Good 
luck 
troubleshoo,ng. 
I’d 
rather 
take 
ad-­‐hoc 
decision 
to 
keep 
business 
afloat 
than 
wait 
for 
IT 
Following 
processes 
is 
good 
for 
the 
long 
term.
Business units 
• The need to get things done ASAP. 
• Decentralisation of decision making the 
norm. 
• Decreased bureaucracy 
• Lean organisations and flatter hierarchies.
IT say 
If IT is expected to help you with your tech, 
they need to be aware of the techs you use. 
If IT is expected to firefight, they also need to 
define security guidelines to prevent the fires. 
Proactive is the way to go. Reactive is so 2004.
Risks involved 
• Acquisition of software from dubious sources – 
download sites, cloud services with poor security 
• Ill-researched information leading to bad tech choices 
• Bug infested software 
• Obvious data security risks 
• Risk of malware or virus infiltrating the corporate 
network
“By 2015, 35% of enterprise IT 
expenditures for most organisations 
will be managed outside the IT 
department’s budget.” 35% Source
How to resolve 
• Broad-minded CIO 
The CIO is to the IT organization what the CEO is to the business. 
• Openness of the IT department 
Processes should be designed around the business and not the other way round. 
• Communication 
Let business know the repercussions of bypassing IT. Earn their respect. 
• Protect and to serve 
After all, IT can’t fight something if we don’t know what we are fighting.
In conclusion 
• Shadow IT is necessary evil. 
• Look at Shadow IT as something that takes burden off 
IT while ensuring necessary processes are followed. 
• IT and business units should work together to ensure a 
smooth and productive work environment. 
Bring IT out of the shadows.
This article was originally published in 
Learn more about managing assets in your organisation here. 
freshservice.com hello@freshservice.com

More Related Content

PDF
Software Asset Management I Best Practices I NuggetHub
PDF
Modern IT Service Management Transformation - ITIL Indonesia
PPTX
IT-Serve: IT Solutions and Service Provider | Dubai UAE
PPT
establish an effective it steering committee
PPTX
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
PPTX
Improve IT Business Alignment With An Infrastructure Roadmap
PPTX
Managed Services - Functional & Customization Support Help Desk
PDF
The ITFM Tool Journey
Software Asset Management I Best Practices I NuggetHub
Modern IT Service Management Transformation - ITIL Indonesia
IT-Serve: IT Solutions and Service Provider | Dubai UAE
establish an effective it steering committee
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
Improve IT Business Alignment With An Infrastructure Roadmap
Managed Services - Functional & Customization Support Help Desk
The ITFM Tool Journey

What's hot (20)

PDF
Shadow IT
PPTX
Cybersecurity Risk Management Program and Your Organization
PPTX
IT Governance Framework
PDF
Why ISO27001 For My Organisation
PPTX
Cyber attacks and IT security management in 2025
PDF
ITIL 4 Verses ITIL v3
PPTX
CRISC Course Preview
PDF
Enterprise Architecture
PPTX
Integrating Security Across SDLC Phases
PPTX
Understanding cyber resilience
PPT
Building an Effective Identity Management Strategy
PPTX
Information risk management
PPT
Need for security
PDF
IT4IT Framework Overview
PDF
Cybersecurity Skills in Industry 4.0
PDF
HITRUST 101: All the basics you need to know
PPTX
The Zero Trust Model of Information Security
PDF
4Q21 Global ISG Index™
PDF
Introduction to Cybersecurity
Shadow IT
Cybersecurity Risk Management Program and Your Organization
IT Governance Framework
Why ISO27001 For My Organisation
Cyber attacks and IT security management in 2025
ITIL 4 Verses ITIL v3
CRISC Course Preview
Enterprise Architecture
Integrating Security Across SDLC Phases
Understanding cyber resilience
Building an Effective Identity Management Strategy
Information risk management
Need for security
IT4IT Framework Overview
Cybersecurity Skills in Industry 4.0
HITRUST 101: All the basics you need to know
The Zero Trust Model of Information Security
4Q21 Global ISG Index™
Introduction to Cybersecurity
Ad

Viewers also liked (8)

PDF
Metrics that Matter: Focusing on key metrics for an efficient service desk an...
PPTX
Gamifying Your Service Desk
PPTX
Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...
PDF
10 things you need to STOP doing in your IT service desk
PDF
Social Support With Freshdesk
PDF
When your favorite characters become support agents
PDF
Guide to writing a perfect knowledge base article
PDF
How to write awesome emails that customers love
Metrics that Matter: Focusing on key metrics for an efficient service desk an...
Gamifying Your Service Desk
Motivating a 300% Increase In Service Desk Efficiency using Freshservice IT S...
10 things you need to STOP doing in your IT service desk
Social Support With Freshdesk
When your favorite characters become support agents
Guide to writing a perfect knowledge base article
How to write awesome emails that customers love
Ad

Similar to Shadow IT - What is it, why it happens and how to resolve (20)

PPTX
Shadow IT Risk and Reward
PDF
Bringing Shadow IT Into the Light
PDF
The Business Value of Shadow IT
PPT
Institute for the entrepreneur v1r3
PPTX
What to expect from your IT People
PDF
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
PDF
Technology & Business - Wharton 2014
PPTX
New Rules for the New IT
PPTX
TechClimb_Webinar_PPT_working_1014
PDF
Six key themes looking at how the impact of new technology drivers are changi...
PDF
Co-Sourcing Your IT Services
PPTX
Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...
PPTX
How to Bring Shadow IT to the Light
PPTX
ShadowITPresentation
PPTX
Common IT Mistakes
PDF
AppSphere 15 - Shining a Light on Shadow IT: A New Way of Working for "Busine...
PPTX
Workshifting Customer Presentation
PPTX
Aligning Corporate Business Goals with Technology
PDF
Технологические тренды (deloitte 2017)
Shadow IT Risk and Reward
Bringing Shadow IT Into the Light
The Business Value of Shadow IT
Institute for the entrepreneur v1r3
What to expect from your IT People
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Technology & Business - Wharton 2014
New Rules for the New IT
TechClimb_Webinar_PPT_working_1014
Six key themes looking at how the impact of new technology drivers are changi...
Co-Sourcing Your IT Services
Loudoun SBDC Information Technology (IT) Investment CIO and Due Diligence Str...
How to Bring Shadow IT to the Light
ShadowITPresentation
Common IT Mistakes
AppSphere 15 - Shining a Light on Shadow IT: A New Way of Working for "Busine...
Workshifting Customer Presentation
Aligning Corporate Business Goals with Technology
Технологические тренды (deloitte 2017)

More from Freshservice (17)

PPTX
SLA Best Practices
PPTX
Automated Patch Management in Freshservice
PPTX
Freshservice Q1 2020 feature roundup
PPTX
Automated patch management in Freshservice
PPTX
6 automation capabilities to modernise your service desk
PPTX
4 step implementation of effective self service
PPTX
Q4 2019 feature roundup - Freshservice
PPTX
ITIL Change Management - Plan and deploy changes with confidence
PPTX
5 things you didn't know you could do with Freshservice Analytics
PDF
Viewing IT Support from a Customer Service Lens
PDF
How to improve life on the Service Desk?
PDF
6 Insights from HDI Conference - #HDIconf
PDF
3 quick tips to improve service catalog – Infographic
PDF
Enterprise service management is finally a business reality
PDF
DevOps - Freshservice
PDF
Increase service desk efficiency with self service
PDF
Introduction to Freshservice
SLA Best Practices
Automated Patch Management in Freshservice
Freshservice Q1 2020 feature roundup
Automated patch management in Freshservice
6 automation capabilities to modernise your service desk
4 step implementation of effective self service
Q4 2019 feature roundup - Freshservice
ITIL Change Management - Plan and deploy changes with confidence
5 things you didn't know you could do with Freshservice Analytics
Viewing IT Support from a Customer Service Lens
How to improve life on the Service Desk?
6 Insights from HDI Conference - #HDIconf
3 quick tips to improve service catalog – Infographic
Enterprise service management is finally a business reality
DevOps - Freshservice
Increase service desk efficiency with self service
Introduction to Freshservice

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
A Presentation on Artificial Intelligence
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Shadow IT - What is it, why it happens and how to resolve

  • 1. Bringing IT out of the shadows
  • 2. What is Shadow IT? The act of purchasing or using technology for the workplace without the approval or knowledge of the IT department is called Shadow IT.
  • 3. Examples • DevOps team purchasing an instance of a caching server to balance load bypassing IT in order to not have users suffer downtime • Sales team sharing crucial customer data, even internally, using a personal account of Google Drive • Using an unauthorised pen drive. Yep!
  • 4. WHY DOES THIS HAPPEN? • IT Department is considered slow and bureaucratic by business units in some organizations. • With the market moving at breakneck speed, business units don’t want to wait for IT to fulfil service requests. • Overzealous employees with (mostly) good intentions Why does this happen?
  • 5. The catalysts • Cloud technology • eCommerce • Tech savvy credit card toting managers • Consumerization of technology
  • 6. Is the practice of Shadow IT bad? Business says NO. IT says YES.
  • 7. Business IT We don’t have ,me to fill forms If you don’t fill forms, there will be miscommunica,on We can do our own tech research, thank you. We do that too. And we are paid to do it. IT is s,ll stuck in with 80s soBware. Stable soBware, anyone? We have the latest soBware at our finger,ps Good luck troubleshoo,ng. I’d rather take ad-­‐hoc decision to keep business afloat than wait for IT Following processes is good for the long term.
  • 8. Business units • The need to get things done ASAP. • Decentralisation of decision making the norm. • Decreased bureaucracy • Lean organisations and flatter hierarchies.
  • 9. IT say If IT is expected to help you with your tech, they need to be aware of the techs you use. If IT is expected to firefight, they also need to define security guidelines to prevent the fires. Proactive is the way to go. Reactive is so 2004.
  • 10. Risks involved • Acquisition of software from dubious sources – download sites, cloud services with poor security • Ill-researched information leading to bad tech choices • Bug infested software • Obvious data security risks • Risk of malware or virus infiltrating the corporate network
  • 11. “By 2015, 35% of enterprise IT expenditures for most organisations will be managed outside the IT department’s budget.” 35% Source
  • 12. How to resolve • Broad-minded CIO The CIO is to the IT organization what the CEO is to the business. • Openness of the IT department Processes should be designed around the business and not the other way round. • Communication Let business know the repercussions of bypassing IT. Earn their respect. • Protect and to serve After all, IT can’t fight something if we don’t know what we are fighting.
  • 13. In conclusion • Shadow IT is necessary evil. • Look at Shadow IT as something that takes burden off IT while ensuring necessary processes are followed. • IT and business units should work together to ensure a smooth and productive work environment. Bring IT out of the shadows.
  • 14. This article was originally published in Learn more about managing assets in your organisation here. freshservice.com hello@freshservice.com