The term “shadow IT” sounds ominous. It conjures up images of half-opened doors leading to dark rooms and strangers lurking where they don’t belong. Shadow IT actually is legitimate IT software and/or services–often in the cloud–based outside of an enterprise environment and with no connection to centralized security. Executives are already nervous about hackers and internal data leaks; they don’t need anything else to worry about. However, as menacing as the shadow IT trend seems to be, it really shouldn’t be. Shadow IT is used pretty much everywhere by people who have the best of intentions. It’s time to acknowledge it, understand it, safeguard it and use it to the best advantage for the employees, IT managers and the organization as a whole. Embracing shadow IT can be illuminating and liberating, even for the most cautious of organizations.

This eWEEK slide show discusses some of the most common myths with the aim to calm fears with perspectives from Sanjay Beri, CEO and co-founder of Netskope, a Los Altos, Calif.-based cloud provider of Web app analytics and monitoring services.

Leave a Reply