skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

This report examines shadow IT, and highlights the risks and challenges created by individuals and executives bypassing formal IT procurement, architecture, and control standards. The report offers actions that CIOs can take to mitigate shadow IT.

Highlights

  • Shadow IT, where executives and individuals are provisioning their own applications to meet their own IT needs, is a growing phenomenon. Rather than banning shadow IT, CIOs should work to accommodate this trend. This research note defines the types of shadow IT and suggests how CIOs can address it.

Features and Benefits

  • Evaluates the risks associated with shadow IT.
  • Proposes actions for CIOs to mitigate shadow IT in the organization.

Key questions answered

  • What is shadow IT?
  • How do I manage shadow IT?
  • Should I prohibit shadow IT?

Table of contents

Ovum view

  • Summary
  • Shadow technologies may make sense to individuals but seldom make sense for the organization
  • Treading the well-meant path of shadow IT
  • Dealing with shadow IT

Appendix

  • Further reading
  • Author

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316


Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now