www.linuxit.com
THEDANGERS
OFSHADOWITShadow IT can be a force for good, driving innovation
and enabling business agility. But unregulated IT
projects can be expensive and dangerous.
www.linuxit.com
ShadowITprojectsoftenarisefromgoodintentions:
www.linuxit.com
ShadowITprojectsoftenarisefromgoodintentions:
•SometimespeopleintheITdepartmentsneaknewtechnologyinto
thecompanywithoutboardapproval.ThisishowLinuxestablished
itselfinmanyserverrooms20yearsago.
www.linuxit.com
ShadowITprojectsoftenarisefromgoodintentions:
•SometimespeopleintheITdepartmentsneaknewtechnologyinto
thecompanywithoutboardapproval.ThisishowLinuxestablished
itselfinmanyserverrooms20yearsago.
•Sometimesotherdepartmentssetupshadow
ITprojects,oftenusingpublicCloudfacilities,
withoutgettingtheITdepartmentonboard.
www.linuxit.com
Butevenprojectsthatbeginwiththebestintentionscanhave
unintendedconsequences:
Ā£
www.linuxit.com
Butevenprojectsthatbeginwiththebestintentionscanhave
unintendedconsequences:
•InlargeITdepartmentswithstrictgovernanceprocedures,individualsorsmall
groupsmightsetupCloud-basedprojectsthatsidestepprocedureandinadvertently
blowaholeinallthecarefullyconstructedsecurity,dataprotectionandprivacy
policies.
www.linuxit.com
Butevenprojectsthatbeginwiththebestintentionscanhave
unintendedconsequences:
•OtherdepartmentskeentodevelopthebusinessmightbuyinCloudserviceson
someone’scompanycreditcard.Thiscanrapidlyspiraloutofcontrolandrackup
enormousbills.
Ā£
www.linuxit.com
Butevenprojectsthatbeginwiththebestintentionscanhave
unintendedconsequences:
•ThishappenedatamajorUKbank;theprojectwasabandoned,theoriginatorleft,
butno-onedaredcanceltheprovisionincasesomethingimportantwasrunningon
it.Thebillranintotensofthousandsofpoundsayear.
??
?
?
??
www.linuxit.com
Enforcementisn’ttheanswer:
www.linuxit.com
Enforcementisn’ttheanswer:
•OrganisationsalreadybanshadowITandquiterightlyclosedownsuchprojects
whentheyarediscoveredanddisciplinethestaffinvolved.
www.linuxit.com
Enforcementisn’ttheanswer:
•OrganisationsalreadybanshadowITandquiterightlyclosedownsuchprojects
whentheyarediscoveredanddisciplinethestaffinvolved.
•However,doyoureallywanttokilloffpotentiallyvaluabledevelopmentand
discourageyourmostdynamicstaff?
www.linuxit.com
Thesolutionisawell-managed,agileITsystem:
www.linuxit.com
Thesolutionisawell-managed,agileITsystem:
•Providingawellmanagedsystemthatisasagileasyourbusinessdemands
removestheneedforshadowprojects.
www.linuxit.com
Thesolutionisawell-managed,agileITsystem:
•Providingawellmanagedsystemthatisasagileasyourbusinessdemands
removestheneedforshadowprojects.
•Bycreatinggreaterintegrationbetweenthefunctions,DevOpscanhaveoffera
strongdefenceagainstshadowIT,givingtheflexibilityuserswantwithinthecontrol
oftheITdepartmentstandards.
www.linuxit.com
Thesolutionisawell-managed,agileITsystem:
•Providingawellmanagedsystemthatisasagileasyourbusinessdemands
removestheneedforshadowprojects.
•Bycreatinggreaterintegrationbetweenthefunctions,DevOpscanhaveoffera
strongdefenceagainstshadowIT,givingtheflexibilityuserswantwithinthecontrol
oftheITdepartmentstandards.
•UsingaManagedServiceProvider(MSP)canprovidecosteffectivefacilitiesfor
businessunitsquicklywithoutcompromisingsecurityandcompliance.
www.linuxit.com
Find out how to ensure your IT system meets your
needs without encouraging the dangers of shadow IT:
DOYOUNEEDTOTAKETHE
DEVOPSORTRADITIONAL
APPROACHTOIT?

More Related Content

PPTX
from shadow IT to empowered IT-asanka 2014 08-gartner catalyst
Ā 
PDF
The Business Value of Shadow IT
PDF
Shadow IT - What is it, why it happens and how to resolve
PPTX
Shadow IT Risk and Reward
PPTX
IT in the Cloud
Ā 
PPTX
Cloud and Virtualization
PPS
CEO's Guide to Effective IT Management
PDF
New Ways to Take Full Advantage
from shadow IT to empowered IT-asanka 2014 08-gartner catalyst
Ā 
The Business Value of Shadow IT
Shadow IT - What is it, why it happens and how to resolve
Shadow IT Risk and Reward
IT in the Cloud
Ā 
Cloud and Virtualization
CEO's Guide to Effective IT Management
New Ways to Take Full Advantage

What's hot (20)

PPS
CEO's Guide Effective IT Management
PPTX
Open Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
Ā 
PPTX
Looking Ahead: Predictions for 2016 and Beyond
Ā 
PDF
The Best Way to Get Trained on Ivanti Products
Ā 
PDF
How Engaged Employees Affect the Bottom Line
PPTX
Transforming the digital experience of your workforce
Ā 
PDF
Roy Atkinson - Closing keynote
PPTX
It's Behind You! Managing Insider Threats to Digital Security with RES Software
Ā 
PPTX
GadellNet Accelerate Tech 2016 presentation
PPTX
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
Ā 
PDF
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
Ā 
PPTX
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ā 
PPTX
Flexible and Secure Workspaces for the Modern Enterprise
Ā 
PPT
NorthCoast HDI September 2014
PPTX
Getting good value from IT
PPTX
Conquer the Barriers to Self-Service Adoption
Ā 
PPTX
How to Stay on Top of Users' Identities and their Access Rights
Ā 
PPTX
Service Delivery Beyond IT - Customer Case Study Webinar
Ā 
PPTX
Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15
PDF
Empowering the evolving workforce with virtual workspaces
CEO's Guide Effective IT Management
Open Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
Ā 
Looking Ahead: Predictions for 2016 and Beyond
Ā 
The Best Way to Get Trained on Ivanti Products
Ā 
How Engaged Employees Affect the Bottom Line
Transforming the digital experience of your workforce
Ā 
Roy Atkinson - Closing keynote
It's Behind You! Managing Insider Threats to Digital Security with RES Software
Ā 
GadellNet Accelerate Tech 2016 presentation
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
Ā 
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
Ā 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ā 
Flexible and Secure Workspaces for the Modern Enterprise
Ā 
NorthCoast HDI September 2014
Getting good value from IT
Conquer the Barriers to Self-Service Adoption
Ā 
How to Stay on Top of Users' Identities and their Access Rights
Ā 
Service Delivery Beyond IT - Customer Case Study Webinar
Ā 
Lessons Learned Through Cloud Transformation CSA PRESENTATION 10-19-15
Empowering the evolving workforce with virtual workspaces
Ad

Similar to The Dangers of Shadow IT (20)

PPTX
A Blueprint for Cloud-Native Financial Institutions
PDF
[Webinar] Announcing the Camunda Cloud Public Beta - February 2020
PDF
AWS Summit Singapore 2019 | Five Common Technical Challenges for Startups
PDF
Tips For Building Private Cloud Architecture With Virtualization
PPTX
The evolving CIO|CISO relationship
PDF
Overcoming Barriers to Adoption of Virtual Worlds in Government
PPTX
From DevOps to NoOps
PPTX
Micro Front-End & Microservices - Plansoft
PDF
Microservices with Spring Boot
PDF
Private cloud without the hassle
PPTX
The cyber house of horrors - securing the expanding attack surface
PPTX
Troubleshooting the Most Common Citrix Complaints for Remote Workers
PPTX
Get the Exact Identity Solution You Need - In the Cloud - Overview
PPTX
Infrastructure as Code with Terraform on AWS
PDF
Failure and agility
PDF
Keedio Stack: BDaaS deployment for dummies by Alessio Comisso at Big Data Spa...
PPTX
CCI2017 - Vademecum per l'Internet of Things in Industria 4.0 - Marco Parenzan
PPTX
Vademecum per l'internet of things in industria 4.0
PDF
What is cloud native and why should you care - Infracoders / DevOps / CloudNa...
PDF
Ensure The Success of VMware Horizon View Deployments
A Blueprint for Cloud-Native Financial Institutions
[Webinar] Announcing the Camunda Cloud Public Beta - February 2020
AWS Summit Singapore 2019 | Five Common Technical Challenges for Startups
Tips For Building Private Cloud Architecture With Virtualization
The evolving CIO|CISO relationship
Overcoming Barriers to Adoption of Virtual Worlds in Government
From DevOps to NoOps
Micro Front-End & Microservices - Plansoft
Microservices with Spring Boot
Private cloud without the hassle
The cyber house of horrors - securing the expanding attack surface
Troubleshooting the Most Common Citrix Complaints for Remote Workers
Get the Exact Identity Solution You Need - In the Cloud - Overview
Infrastructure as Code with Terraform on AWS
Failure and agility
Keedio Stack: BDaaS deployment for dummies by Alessio Comisso at Big Data Spa...
CCI2017 - Vademecum per l'Internet of Things in Industria 4.0 - Marco Parenzan
Vademecum per l'internet of things in industria 4.0
What is cloud native and why should you care - Infracoders / DevOps / CloudNa...
Ensure The Success of VMware Horizon View Deployments
Ad

More from LinuxIT (6)

PDF
What Is an MSP and How Do I Choose One?
PDF
How to make dev ops flourish (and improve your infrastructure)
PDF
Reducing Risk And Cost In With A Linux Infrastructure Maturity Assessment
PDF
See The Benefits Of Our Open Architectures Readiness Assessment
PDF
Best Practice Linux Guide: Virtualization
PDF
Open Architectures- Lessons from the Public Sector
What Is an MSP and How Do I Choose One?
How to make dev ops flourish (and improve your infrastructure)
Reducing Risk And Cost In With A Linux Infrastructure Maturity Assessment
See The Benefits Of Our Open Architectures Readiness Assessment
Best Practice Linux Guide: Virtualization
Open Architectures- Lessons from the Public Sector

Recently uploaded (20)

PDF
109422672-Doc-8973-05-Security-Manual-Seventh-Edition.pdf
PDF
Vinod Bhatt - Most Inspiring Supply Chain Leader in India 2025.pdf
PDF
income tax laws notes important pakistan
PDF
757557697-CERTIKIT-ISO22301-Implementation-Guide-v6.pdf
PPTX
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
PPTX
basic introduction to research chapter 1.pptx
PDF
Sustainable Digital Finance in Asia_FINAL_22.pdf
PDF
Second Hand Fashion Call to Action March 2025
PPTX
chapter 2 entrepreneurship full lecture ppt
PDF
France's Top 5 Promising EdTech Companies to Watch in 2025.pdf
PDF
Diversity and Inclusion Initiatives in Corporate Settings (www.kiu.ac.ug)
PDF
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
PDF
533158074-Saudi-Arabia-Companies-List-Contact.pdf
PPTX
Market and Demand Analysis.pptx for Management students
PDF
Value-based IP Management at Siemens: A Cross-Divisional Analysis
Ā 
PDF
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PDF
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
PDF
Clouds that Assimilate the Build Parts I&II .pdf
PDF
The Influence of Historical Figures on Legal Communication (www.kiu.ac.ug)
109422672-Doc-8973-05-Security-Manual-Seventh-Edition.pdf
Vinod Bhatt - Most Inspiring Supply Chain Leader in India 2025.pdf
income tax laws notes important pakistan
757557697-CERTIKIT-ISO22301-Implementation-Guide-v6.pdf
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
basic introduction to research chapter 1.pptx
Sustainable Digital Finance in Asia_FINAL_22.pdf
Second Hand Fashion Call to Action March 2025
chapter 2 entrepreneurship full lecture ppt
France's Top 5 Promising EdTech Companies to Watch in 2025.pdf
Diversity and Inclusion Initiatives in Corporate Settings (www.kiu.ac.ug)
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
533158074-Saudi-Arabia-Companies-List-Contact.pdf
Market and Demand Analysis.pptx for Management students
Value-based IP Management at Siemens: A Cross-Divisional Analysis
Ā 
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
Clouds that Assimilate the Build Parts I&II .pdf
The Influence of Historical Figures on Legal Communication (www.kiu.ac.ug)

The Dangers of Shadow IT