Shadow IT, the practice of using applications and systems without the explicit approval or knowledge of IT staff, is a growing challenge in higher education. The pandemic has accelerated cloud adoption not only at the enterprise level but also at the user level, increasing the likelihood that shadow IT will proliferate.
The Everest Group reported in 2019 that the cost of dismantling shadow IT accounted for 50 percent or more of IT spending in large enterprises. And shadow IT is as much a problem in higher education as in other industries — perhaps even more so, given the diversity of higher education user groups and its relatively open IT environment.
Shadow IT grows because of a lack of awareness, both on the part of users and the IT department. A wide variety of tools are brought into institutions under the radar, without explicit IT approval or knowledge.
A user needs something to get the job done and, without thinking, signs up for a web-based application: Need online messaging? Why not the same WhatsApp you use for your personal life? Want to do a VoIP or videoconference call? If you don’t love the videoconference solution your institution offers, why not just use the free version of Zoom you use at home? Need to transmit large files? It’s easy to sign up for a Dropbox account, particularly when you’re trying to get the job done remotely.
But in none of these scenarios is any thought given to control, management or security. Self-reliance is often a virtue, but not when it puts the university at risk.
The IT department may be blind to the issue, with no clue about how many unauthorized apps are being used, particularly when those applications are connecting from a home office.
It’s often unclear what security protections the applications are using, and frequent reuse of login credentials, weak passwords and phishing attacks leave user accounts on unauthorized services vulnerable.
With shadow IT, there is also the problem of application confusion and oversaturation. It’s messy when people are deciding for themselves which messaging application or file-sharing service to use.
Unauthorized software may not meet the security standards required by the institution. There are several categories of risk that need to be considered:
Fortunately, the sea of shadow IT is not as murky as it may seem. The best approach involves five steps:
Students, faculty and staff are constantly trying to work as efficiently as possible, particularly when they are doing so away from campus. It’s up to IT to provide them with secure solutions that make this easier.
Shadow IT is a problem, but it serves one good purpose: It provides a view of what capabilities users really need, while software asset management, virtual desktop infrastructure and cloud access security brokers can help IT exercise control and governance over the entire landscape of applications. As always, user education plays a key role.
"*" indicates required fields
Software Asset Management is a business practice that involves managing and optimising the life cycle of software within an organisation.
Software asset management is relevant to many facets of a business - take a look at some of the roles that it can form part of the focus of.
Software vendors come in all shape and sizes - all with their own set of licensing models and rules. We take a look at just a few of them.
As a constantly evolving subject, SAM is not without its challenges. We take a look at some of the most common ones.
Wondering what an investment in SAM could do for your business? Fill out a few details and find out what return you could get!
Answer a few questions about your SAM infrastructure & experience, and we'll put together a personalised recommendation for the future.
A simple health check of what's being used across your Office 365 estate in this FREE, Microsoft backed and easy to setup review.
Just like you would with your vehicle each year, get an annual check up of your software asset management programme.
Overwhelmed by the task of documenting the steps for a successful SAM programme? Get the experts in to help!
Concerned your SAM tools aren't covering your whole estate? Or on the look out for an entirely new tool? Get us in to assist.
Not content with covering all things SAM related, we've teamed up with Capital to provide a comprehensive hardware asset management review.
A simple, one-time reconciliation of the software you have deployed versus the licence entitlement you own.
A regularly scheduled analysis of your organisation's estate, specifically adapted to your needs and budget.
A full appraisal of your Microsoft 365 setup and how best to optimise it through automated recommendations.
An add-on to our SAMplicity One, MOT and Plus offerings, quickly diagnose your ability to migrate your resources to the cloud.
In collaboration with law firm Addleshaw Goddard, ensure the legality of your SAM programme and get assistance with any contract disputes.
Available as standard with SAMplicity Plus, ensure you're compliant if you're unexpectedly audited by a vendor.
We've teamed up with some of the forefront experts in licensing knowledge so you can teach yourself to be an expert too.
Stumped by the continually evolving complexities of SAM? Join us for one of our comprehensive courses, either in-person or online.
It’s chock full of useful advice, exclusive events and interesting articles. Don’t miss out!