The latest survey data from the Cloud Security Alliance shows just how big the problem of unauthorized IT services, or “Shadow IT”, has become. Only 8 percent of the more than 200 global participants from both small and large IT organizations said that they had a good understanding of the number of unmanaged cloud apps in use at their company. Further, nearly half said that their primary concern was that their data in the cloud was not secured. Even if data security can be assured, service outages caused by technical issues, business failures, and the unpredictable nature of cloud startups can quickly erase any business benefits.
An Outdated ApproachMany survey respondents have tried to control the spread of unmanaged apps, including blocking access to cloud services, most commonly Dropbox and Apple's iCloud. However, trying to stop the spread of cloud apps just causes users to seek less secure alternatives and it also stops collaboration and communications behaviors that are now fundamental to business agility and success.
In fact, the top five most requested cloud services involve cross-organization collaboration:
File Sharing and Collaboration (80 percent respondents had users requesting)
Communication (41 percent)
Social Media (38 percent)
Content Sharing (27 percent)
Enterprise Content Management (20 percent)
Always Be ListeningYou need an ongoing Architecture Planning capability that is committed to reflecting user needs in its recommendations, you cannot keep up without one. The right strategy is to work even closer with your users to inform your architecture plans and IT transformation. This capability would be responsible for:
- Developing your cloud principles and polices to protect your information assets including:
- Security and security integration
- Data and data ownership
- Application integration
- Understanding user needs
- Remediating user needs by helping users find solutions or work-arounds in IT approved ways
- Planning solutions and architecture that address the most important threats and opportunities
- Communicating plans and solutions to reduce the spread of unapproved solutions
- Deploying solutions as committed
The Best Kept Secret for IT Professionals.
Learn how we keep you more informed than your competition in half the time.