Collaborat​ion

Shadow IT Can Be a Force for Good

Share this post:

One of the most consistent digital workplace trends over the last 15 years has been the steady and sustained spread of technology away from the IT department and into the hands of the workforce. While the “big” mission-critical transaction systems are likely to stay in the IT department for the foreseeable future, day-to-day technology needs are increasingly being handled directly by the workforce. Part of the consumerization phenomenon, the help-yourself approach to technology, is simply faster, easier and more dependable than submitting a formal request to the often harried IT department, hoping they will eventually be able to supply a solution to meet the need for an ongoing project, task or function.

hinchcliffe-inblog2How prevalent is worker-sourced IT today? Estimates vary but most say that it’s already around half of all technology in the workplace currently, with communications, collaboration, file sharing and productivity apps rounding out the most popular categories. Interestingly, 61 percent of organizations now report they actually support worker-sourced IT in some way, according to recent surveys.

Called “unsanctioned IT” or more commonly, Shadow IT, the use of workplace technology without the support or approval of IT has largely been frowned upon and a cause for concern until quite recently. The perceived concerns include data security, ensuring customer privacy, lack of integration and the overall – and unpredictable – cost of managing it all.

Now enlightened technology and business leaders are beginning to realize that if monitored and channeled appropriately, worker-sourced IT can be a considerable force for innovation, on-the-ground digital transformation and greatly increased capacity for technology change. In short, Shadow IT can actually be a good thing, as long as some basics like security and governance are consistently addressed.

In fact, given how pronounced the trend already is, I have suggested that the long-term role of IT must shift to largely being enablers of a safety net to allow bring-your-own-technology (BYOT) to flourish and thrive, while providing resources to make it easy for workers to use the technology they source to comply with security, compliance and governance.

hinchcliffe-inblog1I’ve explored the reasons for Shadow IT over the years, noting that an essentially accidental technology future is now becoming a widespread reality. A well-established confluence of factors appears responsible for this phenomenon. Perhaps the most significant is the virtually effortless and easy access to an endless list of low-cost, world-class applications now available both through the cloud and through mobile devices with their app stores. Another key factor is the increasingly tech-savviness of the millennial worker in particular – but all workers in general – as the technology in most people’s personal lives exceeds what they have in the workplace. The third major force responsible is the exponential curve of tech change combined with a growing portfolio of legacy IT systems and applications. Combined, these forces ensure that an ever greater amount of IT capacity is required to modernize and keep up, making sure IT backlogs grow and fewer new needs can be met.

The bottom line is that organizations must greatly increase their capacity for digitalization to keep up with how tech-enabled our businesses must be. IT in its current form is over-centralized and lacking sufficient capacity to fully achieve this, no matter what budget is allocated to it. Instead of looking at Shadow IT in a negative light, we can actually tap into and harness the desire for – and ability to realize – better, more effective solutions on the ground in every corner of the business. It’s one of the reasons that there is an important and growing industry conversation about enlisting change agents – empowering those passionate about directly improving how technology is used in their part of the organization – at scale to create a more decentralized model for technology change and adoption.

Finally, Shadow IT also brings badly needed internal competition to the IT department to force better overall solutions to be discovered and adopted. It can also cut costs and respond to market changes faster. Given that virtually all industry watchers have concluded that Shadow IT cannot be prevented, it seems the smartest path for us is to instead put in place the processes and structures that can make it a major force for progress. Organizations willing to design for some loss of control will be major beneficiaries of a steady and sustained stream of worker-sourced technology solutions.

Add Comment
3 Comments

Leave a Reply

Your email address will not be published.Required fields are marked *


Armando Lio

“…Shadow IT can actually be a good thing, as long as some basics like security and governance are consistently addressed.”

In my view the lack of Governance is what led to Shadow IT, either the enterprise did not understand the value of having IT Governance or it was not implemented correctly.

If IT is aligned with each BU and understands their goals and objectives, there would be no need for shadow IT. IT would be considered a strategic partner to each BU.

IT is doing a lousy job in showing how critical it is to any business and rather taking a “keeping the lights on” approach which allows it to be viewed more as a commodity than a critical partner.

Reply

Ann Walton

Thank you, Dion. Although Shadow IT can certainly present some challenges, it can also be necessary and beneficial to meet the business needs of the enterprise.
Governance, security, resiliency and the ability to scale can present challenges with Shadow IT. Perhaps these can be addressed in some organizations with improved collaboration between the IT organization and lines of business.
@annhWalton

Reply

Jason Stathom

Yeah its true shadow it could be force for the good cause in the field of softwares usage in the organization and enterprises. Well we also provides this kind of technology. For more information visit here:- https://www.binadox.com/

Reply
More Social Business Stories
October 20, 2017

Enhance your Connections Experience with Integrations from the IBM Connections Catalog!

The IBM Connections Catalog is now available! You can now easily discover and integrate third party applications from our business partners and independent software vendors to further enhance the Connections experience within your organization. The Catalog, which is replacing ‘Integrated 3rd Party Apps’ and other admin functions, is one of the first set of ‘Pink’ […]

Continue reading

September 25, 2017

It’s Time To Customize IBM Connections!

IBM Connections’ new capability, Customizer, is coming out soon! As the name suggests, Customizer is designed to help web developers modify the IBM Connections user interface using standard web technologies like JavaScript and CSS. In doing so, it opens an avenue that has mostly been blocked off – insofar as IBM Connections has traditionally been […]

Continue reading

September 19, 2017

New Verse On-Premises V1.0.2 Helps Turn Information Overload into Work that Matters

This month, we’re debuting the latest version of IBM Verse On-Premises with exciting new changes to enhance the email experience. With focus on what really matters to your business, IBM Verse On-Premises (VOP) V1.0.2 comes with an updated user interface and major performance gains alongside an array of new features, like: Customizable Action Support for […]

Continue reading