SlideShare a Scribd company logo
1 of 4
Download to read offline
Out of the 
shadows: 
Wake-up call for 
IT departments 
Intelligent Market Research
2 
Out of the shadows: 
A wake-up call for IT 
departments 
Shadow IT – the commissioning and sourcing of core IT products and 
services by departments other than IT - has been used across organisations 
for some time, but it is only now that IT decision makers are beginning to 
fully appreciate the extent of it. It is a way of working that is increasingly 
becoming the norm for business departments, who are independently 
deploying solutions with increasing frequency, despite the risks that may 
be involved. 
IT departments must now adapt if they want to retain some element of 
control over the way technology is utilised within their organisations. 
We surveyed 200 IT decision makers (ITDMs) and 200 business decision 
makers (BDMs) in organisations with more than 1,000 employees, in both 
the UK and the US, to nd out more about shadow IT. 
Find out more: 
Read our latest blog 
‘An alarm call from the 
shadows’ 
Or for a more in depth 
view take a look at our 
recent webcast. 
SHADOW IT 
IS HAPPENING 
CORE IT PRODUCTS/SERVICES ARE BEING 
COMMISIONED BY DEPARTMETS 
OTHER THAN THE IT DEPARTMENT 
Emerging from the 
shadows 
It is clear from our research that shadow IT is not 
in its infancy. More than three quarters of ITDMs 
admit that departments in their organisations 
are engaging in shadow IT; although they 
underestimate how long it has been occurring. 
The majority (58%) believe it has been 
happening for less than two years. 
Of the BDMs whose departments do commission and source IT products and 
services independently of the IT department, 67% say they have been doing it for 
more than two years. 
Half or more of both ITDMs and BDMs, however, believe that the prevalence of 
shadow IT is only going to increase in the coming years. 
All respondent types also had similar views on which products and services are 
being commissioned through shadow IT. Application software, IT security and 
application development all feature highly. 
Find out more: 
What is shadow IT and is 
this something new? Find 
out in our video interview 
with Nicole McNab, Project 
Manager at Vanson Bourne.
Top down or bottom up? 
Shadow IT is far more than employees 
downloading applications on their own 
devices for work purposes. It is the well-planned 
implementation of specic solutions and it 
is mainly being managed from the top down. 
76% of BDMs whose departments are engaging 
in it say that heads of department or other senior 
members of sta are leading the way when it comes 
to shadow IT. 
? ? 
The response from ITDMs is largely the same: 41% of those surveyed, who 
acknowledge that shadow IT is happening in their organisation, say that it is being 
driven by heads of department. 
With senior members of sta steering it, it is not going to be easy for ITDMs to 
question – or indeed tackle – the engagement with shadow IT. 
Furthermore, although IT and business departments do not wholly agree on 
which departments are sourcing and commissioning their own technology 
solutions both show a wide spread across all departments within organisations 
with those that are typically outward-facing such as client services and marketing 
featuring highly. 
Find out more: 
Download our ‘Shadow IT: 
The Headlines’ infographic for 
the headline stats. 
ITDMs WHERE SHADOW IT OCCURS BDMs WHOSE DEPTS ENGAGE IN SHADOW IT 
SAY THE DEMAND 
IS COMING FROM 
DEPT HEADS OR 
SENIOR MANAGERS 
41% 76% 
JUST 9% OF THESE ITDMs  5% OF THESE BDMs 
SAY IT’S COMING FROM EMPLOYEES OR DEPT STAFF 
3 
What you want isn’t 
always what you need 
With the widespread adoption of 
cloud, it has become easier for 
individual departments to commission 
their own applications and services, 
bypassing the internal IT departments. 
Almost 60% of BDMs in departments that utilise shadow IT, say that they 
do it because it is quicker; while 41% believe they know their needs 
better than the IT department and so get what they really want if they 
source it themselves. Even 63% of BDMs in departments not currently 
exploiting it see it as a potentially quicker way of getting what they want. 
Mirroring this, ITDMs also believe that departments engage in shadow IT 
because they think it is quicker (74%) and because they think they know 
their own individual IT needs best (55%). 
But departmental heads do not always see the bigger picture that 
ITDMs do and sourcing technologies outside of the internal IT 
department could have a detrimental eect on the whole organisational 
digital estate. 
Find out more: 
Nicole McNab 
discusses 'Why and 
where is shadow IT 
happening?’ in our 
video interview.
4 
Risky business? 
The biggest risk of shadow IT is that 
IT departments are losing control of the 
products and services used across their 
organisations – they can no longer see 
everything that is being deployed and 
operated within their companies, so can 
no longer manage the associated risks as 
well as they used to be able to. 
Find out more: 
Find out more about the risks posed 
by shadow IT. 
As well as a potential duplication of capability between departments and 
a loss of economies of scale, shadow IT also represents a fundamental 
shift in power between IT departments and the rest of the organisation. 
It is a wake-up call to IT departments. They are not going to be able 
to prevent shadow IT occurring, but essentially they will always be 
responsible for technology within their organisation, whether they 
sanctioned it or not. They must therefore adapt to retain control of IT 
and move from being the provider of technology to become the overall 
guardian of it. 
Find out more: 
Watch our video interview with Nicole 
McNab, where she discusses whether 
IT departments should be worried 
about what shadow IT means for them 
Access the full in-depth market research results on shadow IT 
on our website here. 
Alternatively click on the links below: 
Shadow IT - IT decision makers 
Data Summary 
Shadow IT - Business decision makers 
Data Summary 
Shadow IT: The Headlines 
Infographic 
Shadow IT: Out of the Shadows 
Webcast 
An alarm call from the shadows 
Out latest blog post 
Intelligent Market Research

More Related Content

More from Vanson Bourne

Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne
 
Vanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA TechnologiesVanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA TechnologiesVanson Bourne
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne
 
Vanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley PartnersVanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley PartnersVanson Bourne
 
Vanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success FactorsVanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success FactorsVanson Bourne
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne
 
Vanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech MarketingVanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech MarketingVanson Bourne
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne
 
Vanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne
 
Vanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne
 
Vanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne
 
At a glance - A corporate view of 4G
At a glance - A corporate view of 4GAt a glance - A corporate view of 4G
At a glance - A corporate view of 4GVanson Bourne
 
Research snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GResearch snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GVanson Bourne
 
Research snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyResearch snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyVanson Bourne
 

More from Vanson Bourne (20)

Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
 
Vanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA TechnologiesVanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA Technologies
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBM
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress Software
 
Vanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley PartnersVanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley Partners
 
Vanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success FactorsVanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success Factors
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTT
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter Novelli
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile Strategy
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market Research
 
Vanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech MarketingVanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech Marketing
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech Marketing
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT Security
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013
 
Vanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social Media
 
Vanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology Marketing
 
Vanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT Security
 
At a glance - A corporate view of 4G
At a glance - A corporate view of 4GAt a glance - A corporate view of 4G
At a glance - A corporate view of 4G
 
Research snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GResearch snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4G
 
Research snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyResearch snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategy
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Vanson Bourne Research Insight: Shadow IT - Wake up call for IT Departments

  • 1. Out of the shadows: Wake-up call for IT departments Intelligent Market Research
  • 2. 2 Out of the shadows: A wake-up call for IT departments Shadow IT – the commissioning and sourcing of core IT products and services by departments other than IT - has been used across organisations for some time, but it is only now that IT decision makers are beginning to fully appreciate the extent of it. It is a way of working that is increasingly becoming the norm for business departments, who are independently deploying solutions with increasing frequency, despite the risks that may be involved. IT departments must now adapt if they want to retain some element of control over the way technology is utilised within their organisations. We surveyed 200 IT decision makers (ITDMs) and 200 business decision makers (BDMs) in organisations with more than 1,000 employees, in both the UK and the US, to nd out more about shadow IT. Find out more: Read our latest blog ‘An alarm call from the shadows’ Or for a more in depth view take a look at our recent webcast. SHADOW IT IS HAPPENING CORE IT PRODUCTS/SERVICES ARE BEING COMMISIONED BY DEPARTMETS OTHER THAN THE IT DEPARTMENT Emerging from the shadows It is clear from our research that shadow IT is not in its infancy. More than three quarters of ITDMs admit that departments in their organisations are engaging in shadow IT; although they underestimate how long it has been occurring. The majority (58%) believe it has been happening for less than two years. Of the BDMs whose departments do commission and source IT products and services independently of the IT department, 67% say they have been doing it for more than two years. Half or more of both ITDMs and BDMs, however, believe that the prevalence of shadow IT is only going to increase in the coming years. All respondent types also had similar views on which products and services are being commissioned through shadow IT. Application software, IT security and application development all feature highly. Find out more: What is shadow IT and is this something new? Find out in our video interview with Nicole McNab, Project Manager at Vanson Bourne.
  • 3. Top down or bottom up? Shadow IT is far more than employees downloading applications on their own devices for work purposes. It is the well-planned implementation of specic solutions and it is mainly being managed from the top down. 76% of BDMs whose departments are engaging in it say that heads of department or other senior members of sta are leading the way when it comes to shadow IT. ? ? The response from ITDMs is largely the same: 41% of those surveyed, who acknowledge that shadow IT is happening in their organisation, say that it is being driven by heads of department. With senior members of sta steering it, it is not going to be easy for ITDMs to question – or indeed tackle – the engagement with shadow IT. Furthermore, although IT and business departments do not wholly agree on which departments are sourcing and commissioning their own technology solutions both show a wide spread across all departments within organisations with those that are typically outward-facing such as client services and marketing featuring highly. Find out more: Download our ‘Shadow IT: The Headlines’ infographic for the headline stats. ITDMs WHERE SHADOW IT OCCURS BDMs WHOSE DEPTS ENGAGE IN SHADOW IT SAY THE DEMAND IS COMING FROM DEPT HEADS OR SENIOR MANAGERS 41% 76% JUST 9% OF THESE ITDMs 5% OF THESE BDMs SAY IT’S COMING FROM EMPLOYEES OR DEPT STAFF 3 What you want isn’t always what you need With the widespread adoption of cloud, it has become easier for individual departments to commission their own applications and services, bypassing the internal IT departments. Almost 60% of BDMs in departments that utilise shadow IT, say that they do it because it is quicker; while 41% believe they know their needs better than the IT department and so get what they really want if they source it themselves. Even 63% of BDMs in departments not currently exploiting it see it as a potentially quicker way of getting what they want. Mirroring this, ITDMs also believe that departments engage in shadow IT because they think it is quicker (74%) and because they think they know their own individual IT needs best (55%). But departmental heads do not always see the bigger picture that ITDMs do and sourcing technologies outside of the internal IT department could have a detrimental eect on the whole organisational digital estate. Find out more: Nicole McNab discusses 'Why and where is shadow IT happening?’ in our video interview.
  • 4. 4 Risky business? The biggest risk of shadow IT is that IT departments are losing control of the products and services used across their organisations – they can no longer see everything that is being deployed and operated within their companies, so can no longer manage the associated risks as well as they used to be able to. Find out more: Find out more about the risks posed by shadow IT. As well as a potential duplication of capability between departments and a loss of economies of scale, shadow IT also represents a fundamental shift in power between IT departments and the rest of the organisation. It is a wake-up call to IT departments. They are not going to be able to prevent shadow IT occurring, but essentially they will always be responsible for technology within their organisation, whether they sanctioned it or not. They must therefore adapt to retain control of IT and move from being the provider of technology to become the overall guardian of it. Find out more: Watch our video interview with Nicole McNab, where she discusses whether IT departments should be worried about what shadow IT means for them Access the full in-depth market research results on shadow IT on our website here. Alternatively click on the links below: Shadow IT - IT decision makers Data Summary Shadow IT - Business decision makers Data Summary Shadow IT: The Headlines Infographic Shadow IT: Out of the Shadows Webcast An alarm call from the shadows Out latest blog post Intelligent Market Research