DUBLIN--(BUSINESS WIRE)--Research and Markets (http://www.researchandmarkets.com/research/7hnm2s/stratecast_spie) has announced the addition of the "Stratecast - SPIE 2013-40: The Proliferation of Shadow IT - and the Opportunity for Cloud and Security Service Providers" report to their offering.
In this SPIE, we take a look at the state of shadow IT in companies worldwide. We reveal some surprising results from the Stratecast survey of IT and Line of Business (LoB) employees. Finally, we offer tips to security, cloud, and managed services providers to help enterprises start addressing the risks associated with shadow IT in their own companies.
Just a few years ago, the industry was all abuzz about employees who insisted on using their personal devices, such as iPhones and iPads, to access business applications. Within IT circles, the discussion quickly shifted from "how to stop it" (you can't) to "how to protect your business while giving employees the freedom to make choices." Today, companies report greater productivity and higher employee satisfaction from their Bring Your Own Device, or BYOD, policies.
Are we headed for a similar discussion based around employees' choice of the applications they utilize in business? Are we facing a BYOA (Bring Your Own Application) revolution, in which employees claim the right to choose the tools with which they get their work done, while IT scrambles to protect corporate assets?
The revolution is already here, according to the results of a recent Stratecast survey. Thanks to the ease of access to Software as a Service (SaaS) applications, even non-technical employees feel comfortable and entitled to choose their software - and they are doing so in droves. In many cases, IT departments and security officers are unaware of the extent of "shadow IT," and therefore unprepared to deal with it.
For SaaS providers, the proliferation of shadow IT brings a whole new set of target customers. Rather than dealing with IT gatekeepers, SaaS providers can market and sell directly to individual employees, departments, and business units. However, unfettered access to thousands of SaaS applications, without centralized, policy-based control, opens the company to significant risks. In this SPIE, we take a look at the state of shadow IT in companies worldwide. We reveal some surprising results from the Stratecast survey of IT and Line of Business (LoB) employees. Finally, we offer tips to security, cloud, and managed services providers to help enterprises start addressing the risks associated with shadow IT in their own companies.
For more information visit http://www.researchandmarkets.com/research/7hnm2s/stratecast_spie