Sponsored By

Shadow UC&C Grows Out of ControlShadow UC&C Grows Out of Control

But there are ways for IT to reign in users and gain back control.

Gary Audin

June 24, 2016

3 Min Read
No Jitter logo in a gray background | No Jitter

But there are ways for IT to reign in users and gain back control.

There are many forms of paid, free, and embedded UC&C on the market. They are convenient and easy to use, making them attractive to users, especially if the users want to work around IT or are not willing to wait for the UC&C features to be delivered by IT. The rise of mobile apps expands the number of opportunities for users to avoid IT, which is referred to as shadow UC&C.

Shadow unified communications and collaboration is a term used to describe systems and services implemented and used inside organizations without explicit organizational approval and/or unknown to IT. Another term used for this is "stealth UC," which describes solutions implemented by departments other than the IT or telecom departments. I use shadow UC&C. I use Dropbox to share files or when the file is too large to be sent as an attachment. I collaborate using GoToMeeting and WebEx.

Like shadow IT, shadow UC&C solutions may not align with an organization's requirements for control, documentation, security, reliability, etc. Shadow UC&C has no enterprise governance. It does not meet corporate, regulatory, or legislative requirements. The question of who owns the media content is open to interpretation. Security and privacy requirements will most likely not be satisfied.

All of these problems are complicated by the fact that different countries have different rules for security, privacy, and compliance. What if a private conversation is leaked on the Internet? In some countries it is a crime to insult government leaders. The end user probably does not know the rules or how to comply, which makes the enterprise vulnerable to fines, penalties, and litigation.

Over-the-top content (OTT) is the transmission of audio, video, and other media independent of the transport network, for example, over the public Internet (ISP). Although the ISP may be aware of the content, it has no control over and is not involved with the distribution of the content. The content is typically free, embedded in an application, or may have a modest fee for its use, but revenue goes to the OTT organization, not the ISP. Skype is an example. Many OTT offers are part of social network services.

The OTTs are not regulated and do not need to support 911 calls. They may use the media that they transfer for their own purposes because the usage agreement with the user allows them.

I encountered a frustrated IT manager who was trying to rein in nurses at a remote clinic. They were using free Skype with video for medical consultations. These transmissions weren't covered by HIPAA but the nurses did not know nor care about the compliance requirements. Fortunately, once Skype usage was stopped, no problems occurred. What if a financial manager used Skype for customer consultations? Was the conversation recorded in a central depository? Did the communication comply with the required privacy requirements? Probably not.

Web Real-Time Communications (WebRTC) is an open source technology that allows real-time communication (voice, video, data) to operate natively within a Web browser. It is supported by Google, Mozilla, and Opera browsers. WebRTC emerged as part of the HTML5 WC3 and IETF standard after Google acquired two companies (GIPS and On2) and decided to make their technology available to the open source community. There is a free plug-in for IE and Safari from Temasys which expands the number of WebRTC-enabled browsers.

As can be seen in the graphic below, many organizations have adopted the use of WebRTC in their products and services. Most do not even mention WebRTC as the tool they use. WebRTC allows multi-media communications to be transparently embedded in their applications so that the user doesn't even know that WebRTC is being used.

The use of WebRTC is rapidly expanding UC&C in many forms, producing a growing problem for the enterprise. The number of UC&C choices both visible and invisible make the use of shadow UC&C even more common.

There are five actions you can take to reduce, mitigate, and hopefully stop shadow UC&C:

I first wrote about Shadow UC in "Coping with Shadow UC"

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.