Unknown Unknown Author
Title: Industry voice: Taking back control: how to defeat the perilous spectre of shadow IT
Author: Unknown
Rating 5 of 5 Des:
Despite its name, the business challenges of shadow IT have emerged from the darkness in recent years and are now firmly in the spotlight. ...
Industry voice: Taking back control: how to defeat the perilous spectre of shadow IT

Despite its name, the business challenges of shadow IT have emerged from the darkness in recent years and are now firmly in the spotlight. With PwC estimating that shadow IT accounts for between 15% to 30% of IT spending outside of the IT enterprise budget, it not only presents a real blind spot for enterprises, but has a significant impact upon the security and integrity of company information, and in turn, customer confidence.


IT departments no longer have control over all IT solutions implemented within the organisation, with many taking the approach of trying to lock down their infrastructures to prevent shadow IT purchases from occurring.


The balance however has been tipped too far and by bringing it out of the shadows and into plain sight, enterprise IT Directors will be able to regain control and ensure their entire infrastructure – wherever it is – is transparent and compliant.


The rise of shadow IT


In its simplest sense, shadow IT has been facilitated by the availability of public cloud services and the ease with which every single employee has the potential to act independently from the IT department and consume cloud infrastructure, business applications and utility software either via a free trial or paid for by their credit card.


Use of such services, and their costs, have not been approved by those that hold the purse strings and so easily slip under the radar with huge implications for information security and customer confidence, should data become lost or compromised. With Gartner predicting that by 2016, 35% of enterprise IT expenditure will go to shadow IT resources, the scale of the problem is clear to see.


Understanding the challenges


Instead of burying their heads in the sand, enterprises need to understand that shadow IT is here to stay, giving their business agility and speed. So rather than the traditional approach of 'shut it down', CIOs should instead focus on future-proofing their organisation by embracing shadow IT, and offering access to flexible, on-demand resources with a hybrid cloud portal.


This gives employees the flexibility they desire, but in a structured and secure manner, providing CIOs with the opportunity to regain control over the entire IT environment.


The following nine points outline the key challenges that shadow IT presents and how a hybrid cloud architecture, supported by a comprehensive cloud management platform, can provide CIOs and IT departments with the most viable solution to their existing and emerging IT woes.


1. Meeting data protection and privacy needs


Customers need to know where their data is held and when handing it over, expect the holder to be compliant with the appropriate data protection legislations. The unintentional exporting of data via unauthorised shadow IT applications can impact upon a provider's reputation and credibility.


By adopting a hybrid cloud infrastructure, enterprises can mitigate this risk by providing flexibility and options for each business unit to select a provider of choice – whether via public or private cloud – which can be managed centrally for no nasty surprises.


2. Auditing and compliance


Most businesses require their partners to meet industry standards and will conduct an audit of their IT environment to ensure compliance. Shadow IT applications add a layer of complexity into this process if more formal compliance audits need to happen. By bringing all cloud services under one management layer, enterprises can support compliance needs by providing full event logs.


3. Viruses and backdoors


Public cloud services often come with a huge library of templates for virtual machines, which sounds great in practice, but can be a risky option as some will have backdoor access, Trojan horse software, fail to identify viruses or create insecure default configurations. Users of these templates could unwittingly be putting their data and platform security at risk, which can cause problems for future upgrades and application performance.


4. Security of data


In a well-managed development process, extensive testing against a variety of data is mandatory. However it can be hard to generate realistic data so developers often use production data and anonymise it in some way. Keeping the test data in a controlled environment and knowing where it is, is essential to keeping it secure. Any breaches via a public cloud application can have a detrimental effect on reputation and future operations.


5. Staff turnover


When employees have created their own public cloud accounts which hold test or production systems, this presents a huge business risk when those employees leave. Under normal circumstances, IT departments liaise with HR to revoke system access, return laptops and mobile phones, to minimise risk to data or systems. When that data and systems are outside of the company's direct control, however, there may be access issues for the business.


6. New systems rollout


Systems that are being tested or trialled by users in public cloud environments can become production systems almost without a formal rollout. This has implications for SLAs and with a history of long outages for some key providers, this may impact internal and external customers. One way to keep test and development systems "sandboxed" and away from production users is to keep them on a separate network.


7. Security of IP


When developers use public cloud services such as Pastebin, Github, RubyForge and StackOverflow to share code with each other, there is a risk to your intellectual property. This challenge can be partly met by having control over which templates can be used and providing your teams with a viable alternative by selecting appropriate software, building a template and making it available as a shared template in your application library.


8. Cost control


Over the last few years, availability of cloud computing has meant that the normal IT approval and procurement process is often shortened. A need is identified and cloud resources are purchased, often on company or personal credit cards, and then expensed. Sometimes free trial accounts are used which shortens the process even more.


This results in confusion, wasted time trying to figure out the process, and spiralling costs. By conducting a review of expense claims to look for cloud services, enterprises can get a good idea of the scale of spending.


9. Getting locked into the cloud


It may seem counterintuitive that the public cloud can lock you in. With many cloud providers, you can't export your VM image or even "clones" of those images in private template libraries. Selecting your cloud provider based on your future need means that planning is essential, and the shadow IT approach clearly bypasses that vital step.


Hybrid is the answer


Enterprises can mitigate the challenges highlighted above by adopting a hybrid cloud architecture. This provides more flexibility, while also being structured and secure, maintaining control and assuring data governance.


As enterprise IT evaluates the best technical approach for hybrid IT management, it's vitally important that the speed, flexibility and agility drawing end users to public clouds in the first place be preserved in the hybrid model.


The most successful models involve enterprise IT as a service provider for public cloud resources, delivering effective on boarding, training, management tools and guidance to the business units who want to take advantage of public cloud services. If end users feel that these new IT processes are heavy-handed and restrictive, the IT department will be ignored or rejected altogether – driving shadow IT deeper underground.



  • Ian Finlay is Vice President at Abiquo




















from TechRadar

Advertisement

 
Top