Sponsored By

Combating Shadow IT Once-and-For-AllCombating Shadow IT Once-and-For-All

Learn how to mitigate the risks and build trust with IT.

Gary Audin

April 2, 2020

3 Min Read
Combating Shadow IT Once-and-For-All
Image: Gerd Altmann - pixabay.com

Shadow IT; when your business units use outside services to avoid the IT organization. This application and infrastructure system are accelerating with a wide range of offerings from the cloud. Business units find the cloud attractive for unified communications (UC), especially now with the expansion of remote workers and contact center services.

 

Before the cloud, there was little competition for the IT organization. IT has traditionally been the source of digital technologies for the internal business units. Business units go IT to fulfill their requirements and didn’t go outside the enterprise. By bypassing IT, business units have entered a territory they have little experience with operating with. The IT organizations may view the cloud as an invader but instead should see cloud services as a competitor.

 

Acknowledge shadow IT existence

Cloud providers can pursue business units without your knowledge. Many cloud services focus on specific industries and speak to the units with well-prepared solutions. Your internal business customers want to be more agile, be able to respond fast to market changes, up-and-down scale capacity for seasonal variations, and avoid big investments. Moving to a pay-as-you-go service model is also a budget control solution.

 

You can’t defeat shadow IT by presenting several negative rationales about cloud services. It will probably backfire and produce a poor reputation that will be very difficult to overcome.

 

Learn from the customer through feedback

Internal customers have concerns, goals, restraints, and limited budgets. The IT organization should listen to the business concerns to properly address these them before they turn into bigger issues. This strategy should be an ongoing effort, not one- or two-time event. Someone from the IT organization should be assigned to the business unit as a liaison to IT and act as evangelist for the business unit. The feedback from the internal customer should be evaluated and included in any proposals that compete with shadow IT solutions. IT should learn the language of the business unit and act as a technology interpreter. Any IT proposals should not only satisfy the business unit, but the proposals should also fit in well with long-term goals.

 

The customer doesn’t know what you know

Internal customers are results-driven, not by technology. Moving to shadow IT may be their initial foray into IT technologies. The IT organization should focus on what the solution should entail. Business units will know about security and privacy but probably not how to deliver them. IT knows more about resiliency, disaster recovery designs and delivery, as well as service level agreements, and what they may not include when provided by a cloud service. The business unit will also be able to ask questions about how the cloud services them. IT will be able to investigate how cloud services are delivered.

 

Building trust with IT

Trusting in IT can avoid pushback by the business unit, and it can be easily lost, but hard to recreate. Not all IT projects are great successes. How the IT organization fairly addresses failures goes a long way to build trust. IT leadership should demonstrate that they’ve learned from failures and aren’t likely to repeat them. If, and when another occurs, then the business unit knows there is a lack of learning whether from the experience or intentional deceptions in ITs practice. It’s important to establish the business unit’s expectation – that feedback will be heard and responded to before an IT solution is accepted.

 

This isn’t an insult to IT

Don’t let your ego get in the way of delivering an acceptable solution to the business unit. It requires looking in the mirror to see whether IT or the business unit is causing the conflict. The business unit is looking for support, and an effective solution – one that is less about controlling and containing them and more about trust and collaboration. That will result in achieving a greater collective strength.

 

Eliminate the ego, and you unleash capabilities that reach the best solution.

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.