What is shadow IT? | Definition from TechTarget – TechTarget

Shadow IT is hardware or software within an enterprise that is not supported by the organization’s central IT department. Although the label itself is neutral, the term often carries a negative connotation because it implies that the IT department has not approved the technology or doesn’t even know employees are using it.
Shadow IT can introduce security risks when unsupported hardware and software are not subject to the same security measures that are applied to supported technologies. Furthermore, technologies that operate without the IT department’s knowledge can negatively affect the user experience of other employees by using up network bandwidth and creating situations in which network or software application protocols conflict. Shadow IT can also become a compliance concern — for example, when an employee stores corporate data in their personal Dropbox account.
In the past, shadow IT was often the result of an impatient employee’s desire for immediate access to hardware, software or a specific web service without going through the necessary steps to obtain the technology through corporate channels.
With the consumerization of IT and cloud computing, however, the meaning expands to cloud services that meet the unique needs of a particular business division and are supported by a third-party service provider or in-house group instead of by corporate IT. Popular shadow apps include Google Docs and instant messaging services such as Slack. It even includes personal technology that employees use at work, sometimes as part of a bring-your-own-device policy. Popular shadow technologies include personal smartphones, tablets and USB flash drives.
Feelings toward shadow IT are mixed. Some IT administrators fear that if shadow IT is allowed, end users will create data silos and prevent information from flowing freely throughout the organization. Other administrators believe that in a fast-changing business world, the IT department must embrace shadow IT for the innovation it supplies, and create policies for overseeing and monitoring its acceptable use.
Editor’s note: This article was originally written by Caitlin White and expanded by Kathleen Casey.
Databases use data serialization languages, like XML and YAML, to transfer data between applications. XML and YAML have different…
The rise in digital information is causing a shortage in data center storage space. Containerized data centers can be for …
Astera Labs is using the CXL interface in its now longer Smart Cable Module to spread out energy consumption while enabling GPU …
Score one for IT orgs that rely solely on upstream code, as Flux CD sails on. But Weaveworks’ demise points to larger issues for …
The dream of zero-touch autoremediation remains alive for the bank as it prepares to go all in on Dynatrace SaaS for …
Automating repetitive tasks like software upgrades, lifecycle management and incident reports with a configuration management …
Many organizations struggle to manage their vast collection of AWS accounts, but Control Tower can help. The service automates …
There are several important variables within the Amazon EKS pricing model. Dig into the numbers to ensure you deploy the service …
AWS users face a choice when deploying Kubernetes: run it themselves on EC2 or let Amazon do the heavy lifting with EKS. See …
This year’s VMware Explore conference ran from Aug. 21 to 24. Read the latest news and announcements about and from the event, …
TechTarget hosts its Best of VMware Explore Awards to recognize outstanding products that help organizations create …
Submit your entry for the Best of VMware Explore 2023 Awards for a chance to win.
All Rights Reserved, Copyright 2010 – 2024, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information

source

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top