SaaS discovery<\/a> tools are the most systematic and reliable, but even manual checks can help uncover shadow resources. <\/p>\n\n\n\nWhen you find a shadow resource, document it, and work with users to understand why<\/em> they use it. Their answers can help you understand what your company is missing in its current toolset. If the company does<\/em> offer an adequate alternative that they didn\u2019t know about, this reveals a communication gap. The good news is that these are easy to fix with an email, memo, or quick training session. <\/p>\n\n\n\nDocument shadow IT instances and their underlying reasoning as you discover them. Over time, this will help you identify patterns, so you can address shadow IT at a systemic level rather than only by individual instance as it crops up. <\/p>\n\n\n\n
2. Address these needs collaboratively. <\/h3>\n\n\n\n
When we asked SME IT professionals why they think employees use shadow IT, they reported the six following reasons: <\/p>\n\n\n\n
\n- To make their jobs easier (54%)<\/li>\n\n\n\n
- To be more productive (51%)<\/li>\n\n\n\n
- To test out new technology (45%)<\/li>\n\n\n\n
- To gain functionality that authorized tools don’t offer (43%)<\/li>\n\n\n\n
- Because the procurement process for new apps takes too long (36%)<\/li>\n\n\n\n
- Existing processes for adding authorized applications are onerous (32%)<\/li>\n<\/ul>\n\n\n\n
For the most part, these reasons can be boiled down to three underlying problems:<\/p>\n\n\n\n
a) Your organization doesn\u2019t offer what your users need.<\/strong>
In these cases, you\u2019ll need to get to the root of the problem by probing users: what do they like about the shadow resource they\u2019re using? What could they not live without?
<\/p>\n\n\n\nb) Your organization <\/strong>does<\/em><\/strong> offer something, but users are interested in an alternative.<\/strong>
<\/strong>If users aren\u2019t satisfied with a current process or solution, consult with them to find out why<\/em>. Often, users aren\u2019t aware of everything an existing tool can do (or even that a tool exists!), and some additional training can help them use tools already in place to solve their problems. In other cases, document unmet needs so you can find the right tool to meet it.
<\/p>\n\n\n\nc) Users struggle to follow established procedures for procuring and using approved resources.<\/strong>
<\/strong>These cases can be helpful insights into which processes and tools that need improvement. <\/p>\n\n\n\nAs you look for solutions, consult with users. Make sure options you\u2019re considering would work for them \u2014 because if they won\u2019t, it won\u2019t take long for users to revert back to shadow IT. <\/p>\n\n\n\n
Of course, not every case of shadow IT can be solved immediately, in the most ideal way possible. Factors out of your control, like budget, security, compliance, competing priorities, and compatibility with your current suite can influence your options. Often, it can help to come up with an interim solution while you work on looking for a more permanent one. These interim solutions should still account for what users can tolerate, so make sure you keep the solution evaluation process collaborative with them.<\/p>\n\n\n\n
3. Build a working relationship with your users when it comes to shadow IT management. <\/h3>\n\n\n\n
In general, you should strive to maintain an open stream of communication with users when it comes to resource usage. Listen to their needs, and prioritize finding alternative resources when possible. <\/p>\n\n\n\n
In addition, you should make sure you have user-friendly processes in place for requesting tools.Over one-third of SME IT professionals attributed shadow IT to long procurement processes, which means that streamlining the approval and procurement process can help prevent shadow IT. While not every part of the procurement process will likely fall under IT\u2019s direct control, consider optimizing for:<\/p>\n\n\n\n
\n- Speed: <\/strong>Look for ways to expedite approval processes where possible. Try starting with low-cost or low-risk tools.<\/li>\n\n\n\n
- Automation:<\/strong> Automation is a great way to speed up processes and make them easier for both users and your IT team to follow.<\/li>\n\n\n\n
- Flexibility:<\/strong> Demonstrate that you\u2019re open to requests and working with users to alternatives to what currently exists. This will encourage users to follow the procurement process rather than sidestep it.\u00a0<\/li>\n\n\n\n
- Clarity:<\/strong> Make the process easy to understand, reduce unnecessary steps, and explain tool restrictions.<\/li>\n\n\n\n
- Transparency:<\/strong> Show users where their requests are in the process. When you can\u2019t accommodate a need, explain why, and work with them to find an alternative.\u00a0<\/li>\n\n\n\n
- Cross-team collaboration:<\/strong> Work closely with procurement, finance, and legal teams to align goals, and treat requests as a collaboration between your users and IT teams.\u00a0<\/li>\n<\/ul>\n\n\n\n
Over time, a collaborative approach and user-friendly processes will build a relationship of trust and transparency between your users and IT team. Foster these sentiments by continuing to check in on shadow IT with a solution-oriented approach, and treat instances of shadow IT as opportunities to learn and improve.<\/p>\n\n\n\n
Use Security Investments to Manage Shadow IT<\/h2>\n\n\n\n
Organizations are investing heavily in cybersecurity to address these growing risks. Over three-quarters (77%) of SME IT professionals expect their IT budget to increase over the next 12 months, and the top IT spending category is tools and services. <\/p>\n\n\n\n
SaaS management and discovery tools are becoming critical investments for mitigating the rise in shadow IT. With a tool that can reliably detect shadow IT as it arises, you can systematically reduce it in your environment. And when you combine SaaS discovery with the tactics above, you can leverage shadow IT to your advantage by using it as a way to prevent, detect, and address unsanctioned IT. <\/p>\n\n\n\n