3 steps to managing shadow IT

3 steps to managing shadow IT

Cisco
Published by: Research Desk Released: Nov 13, 2019

Uncover and block unsanctioned apps across your enterprise with App Discovery and blocking by Cisco Umbrella. Securing what you can’t see is a difficult challenge. In today’s digital workplace, organizations, departments, andindividual users are embracing the cloud and leveraging new apps at breakneck speed. This dizzying rate of adoption makes it difficult for security leaders to track app use and ensure that the proper protections are in place.Incredibly, 98 percent of cloud services are adopted without any IToversight.  The result? A shadow IT epidemic that leaves enterprises vulnerable to data compromise or loss, as well as financial risk.

According to Gartner:

  • By 2020, one-third of successful attacks on enterprises will be leveraged on data located in shadow IT resources, including shadow Internet of Things.
  • Shadow IT contributes to 30 to 40 percent of IT spending in large enterprises. Users are adopting readily available SaaS, IaaS, and PaaS applications for many well-intentioned reasons: gains in productivity, collaboration, and real-time insights, among other perks. But without a coordinated cloud enablement strategy, this kind of rogue activity can have farreaching security and financial implications.