IT Pros Believe Shadow IT Could Become a Competitive Advantage, Study Shows

 Organizational agility and communication key to solving Shadow IT, reports Entrust Datacard survey of 1,000 US IT professionals

×

Entrust Datacard’s new report, The Upside of Shadow IT: IT Security Meets Productivity, shows organizations how to balance organizational security with employee convenience. https://bit.ly/2qeACxl

MINNEAPOLIS--()--A survey of 1000 US-based IT professionals by Entrust Datacard found that 77 percent of IT professionals believe their organizations could earn an edge if company leaders were more collaborative with their businesses to find Shadow IT solutions.

As organizations adapt to changing technologies, employees are eager to use productivity solutions that help them function more efficiently — even if these solutions are outside the company’s IT rules and processes. This is the “Shadow IT” infrastructure – ungoverned and unapproved solutions from file hosting services to personal smartphones on the corporate network that introduce serious security blind spots for management.

Entrust Datacard’s new report, “The Upside of Shadow IT: Productivity Meets IT Security” helps business and IT leaders better understand Shadow IT, and discover how to balance enterprise security with employee productivity. The report found that while today’s IT departments often lack the processes and protocol to allow employees to use their preferred technologies securely, with the right collaboration between IT and executive leaders, organizations have the potential to deliver the agility needed to embrace Shadow IT and create a competitive advantage.

“Security of both customer and company data is a top concern for every enterprise, but employee satisfaction comes in at a close second,” said Anudeep Parhar, CIO Entrust Datacard. “As the number of workplace technologies increases, IT teams must create more agile organizations that embrace modern security protocols — from high-security password-less systems access to hands-free authentication — while preserving employee innovation and collaboration.”

Key findings from The Upside of Shadow IT report include:

Empowering employees to use their preferred tools can deliver long-term benefits
IT teams recognize the rise in Shadow IT suggests employees want better ways to work. 77 percent of IT employees surveyed believe that their organizations could earn an edge over competitors if company leaders were more collaborative about finding solutions to Shadow IT needs from both IT and non-IT employees.

Ignoring employee requests drives more Shadow IT
Slow IT approval processes can frustrate employees and lead them to introduce even more security risks to organizations. Only 12 percent of the IT departments surveyed follow up on all employee requests for new technologies.

What risk? Communicating the risk and consequences of Shadow IT is critical
Although IT departments are aware of the security risks of Shadow IT to their organizations, most employees are not. More than one-third (37 percent) of the IT employees say their organization does not have clearly outlined internal consequences for when employees bring on new technologies without IT approval.

Does your Shadow IT problem come from within IT itself?
While most would think IT departments are the most diligent when it comes to following protocols, this is not always the case. 40 percent of the IT employees reported having used a device, application or other technology that is new to the organization without first receiving approval from IT.

Balance low friction and high security: Solve the Shadow IT Challenge
The findings of The Upside of Shadow IT research suggest that it’s more important than ever for organizations to identify the right solution or combination of solutions that best protect them from security threats without disrupting employee productivity, such as:

  • For cloud-based productivity tools, organizations should consider CASBs to extend the reach of security policies beyond company infrastructures.
  • When technology approval and other security processes create too much friction for employees, organizations should consider identity-based security solutions to create a 360-degree view of employees based on a profile of factors like the user’s usual IP addresses and location.
  • To navigate changing regulations and standards, organizations should consider investing in compliance to establish that alignment with industry regulations is a top priority for the company.

To learn more about The Upside of Shadow IT, watch the explainer, read the blog series or download a full copy of the report, visit www.entrustdatacard.com/pages/Shadow-It.

About Entrust Datacard Corporation
Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure issuance technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications. With more than 2,500 Entrust Datacard colleagues around the world, and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information, visit www.entrustdatacard.com.

Contacts

Michelle Morgan-Nelsen
Entrust Datacard Public Relations
+1 (952) 988-1796
michelle.morgan-nelsen@entrustdatacard.com

Release Summary

The new Entrust Datacard report, “The Upside of Shadow IT,” helps business and IT leaders balance enterprise security with employee productivity.

Contacts

Michelle Morgan-Nelsen
Entrust Datacard Public Relations
+1 (952) 988-1796
michelle.morgan-nelsen@entrustdatacard.com