IT Departments: Stop Complaining about Shadow IT: Page 2

The IT department may not have sanctioned a cloud or other tech tool, yet it still may be very useful.


How to Help Your Business Become an AI Early Adopter

Posted September 23, 2013

Jeff Vance

(Page 2 of 2)

I'll write more on the Snowden issue later this month, but for now let's me just say that since the NSA was spying on everyone – foes, allies, U.S. citizens, the editorial staff at Cat Fancy magazine (okay, I'm joking with that last one; well, I think I'm joking) – I doubt blacklisting U.S. cloud service providers would do much good. However, it's at least a factor to consider.

Edholm noted that smaller European companies don't worry so much about the NSA issue, but larger enterprises that have regulators constantly breathing down their necks may not be willing to take the risk of adopting cloud services from U.S. providers.

Equinix tackles the problem through automation

George Do, Director of Global Information Security for Equinix, has set out to solve the Shadow IT problem by becoming an early adopter of a new technology himself.

Equinix was an early tester of startup Skyhigh Network's cloud security services. "I'm not sure we were the very first tester, but we were certainly one of the first," Do said.

Skyhigh Networks' cloud security service automatically discovers which cloud services various departments and employees are using. "We just forward them device logs, and they figure it out for us. It's all automated, and their system automatically generates risk scores," he said.

For instance, if your sales team has adopted salesforce.com, you'll see a pretty low risk score. Various security issues have already been addressed, although you may still need to block certain types of activities, such as downloading contracts onto a mobile device, that are too risky to allow.

After discovery, the Skyhigh Networks platform enforces various security policies, and includes features such as automatic data leak prevention.

What happens, though, when some service eagerly adopted is too insecure to accept?

"This happens less often than you'd think, and the risky services tend to be from Mom-and-Pop shops. In those cases, it's simply a matter of informing people that there's a better tool out there, one suited for enterprise activities," Do said.

In the future, IT's power could actually grow because of this trend. For example, if IT learns that users love a certain tool, but it's insecure, they could have leverage over the vendor. They may even have equal leverage over the competing vendor who provided the IT-preferred tool, especially if IT can show that employees don't like it because of, say, ease of use issues.

IT could become the hammer that pounds vendors into shape. If you're a cloud provider worried about losing a big customer like Equinix, I imagine you'd be pretty motivated to address their concerns, especially with a bright red risk score staring you in the face.

Jeff Vance is a technology journalist based in Santa Monica, Calif. Connect with him on Twitter @JWVance.

Page 2 of 2

Previous Page
1 2

Tags: cloud computing, shadow IT, IT department

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.