{"id":1384,"date":"2015-04-30T14:00:51","date_gmt":"2015-04-30T19:00:51","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=1384"},"modified":"2021-06-04T16:45:27","modified_gmt":"2021-06-04T21:45:27","slug":"what-is-shadow-it","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/","title":{"rendered":"What is Shadow IT?"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-3994\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/network-and-communications-concept-300x200.jpg\" alt=\"A series of glowing dots connected by lines are superimposed over a close up of a person's hands as they use a smartphone, symbolize a network.\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/network-and-communications-concept-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/network-and-communications-concept-1024x684.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/network-and-communications-concept-768x513.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/network-and-communications-concept-1536x1026.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/network-and-communications-concept-2048x1368.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/11\/network-and-communications-concept-200x134.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Shadow IT is often defined as internal projects such as <a href=\"https:\/\/www.stratospherenetworks.com\/cloud-consulting-services.html\" target=\"_blank\" rel=\"noopener\">cloud solutions<\/a> that people manage and utilize without the knowledge of the IT department, <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/cloud\/what-is-shadow-it.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">according to McAfee<\/a>.\u00a0It also refers to simply any unauthorized uses of technology. The trend began with items such as unauthorized Excel macros and has taken off along with the proliferation of software and services delivered via the cloud.<\/p>\n<p>In the past, shadow IT was often caused by an impatient employee\u2019s wishes for immediate access to software, hardware or a web service without going through the company\u2019s required process. However, today, the meaning has expanded to include personal devices that the employee might use at work, or a program or cloud service that the IT department is not aware of.<\/p>\n<p>While Software as a Service (SaaS) solutions have become the most common type of shadow IT, it can also include the following, <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-shadow-it.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">according to Cisco<\/a>.<\/p>\n<ul>\n<li>Boxed software sold in stores<\/li>\n<li>Hardware such as laptops, smartphones and PCs<\/li>\n<li>Other cloud products such as <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-platform-as-a-service-your-guide-to-paas-and-its-business-benefits\/\" target=\"_blank\" rel=\"noopener\">Platform as a Service (PaaS)<\/a><\/li>\n<\/ul>\n<p>This phenomenon is far from uncommon: Even among IT department employees themselves, 40 percent report utilizing an unapproved application, device or other form of technology, a survey of 1,000 U.S. IT professionals conducted by Entrust Datacard found, according to the press release &#8220;<a href=\"https:\/\/www.businesswire.com\/news\/home\/20191015005271\/en\/%C2%A0IT-Pros-Believe-Shadow-IT-Could-Become-a-Competitive-Advantage-Study-Shows\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">IT Pros Believe Shadow IT Could Become a Competitive Advantage, Study Shows<\/a>.&#8221;<\/p>\n<p>As that headline suggests, the survey also found that respondents felt the trend of shadow IT shows that employees prefer a different way of working, and 77 percent thought their companies could outperform the competition and boost productivity if leaders collaborated more with staff members to better meet their tech needs.<\/p>\n<p>However, particularly as the onslaught of cyberattacks continues, shadow IT presents considerable risks to businesses in terms of <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> and compliance, as these tech tools aren&#8217;t included in companies&#8217; security strategies and auditing processes. Shadow IT can easily put your network at risk and lead to data breaches, <a href=\"https:\/\/www.masergy.com\/blog\/shadow-it-getting-the-visibility-you-need\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">according to Masergy<\/a>.<\/p>\n<p>Ultimately, IT departments must deploy risk mitigation strategies including comprehensive network visibility and examination of usage statistics, Masergy states. Our team of security analysts can assist you with network management and the discovery of unauthorized applications and devices. Give us a call at\u00a0877-599-3999 or email\u00a0<a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>\u00a0for details.<\/p>\n<p><em>Editor&#8217;s note: This blog entry was updated on June 3, 2021, with accurate and current information.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shadow IT is often defined as internal projects such as cloud solutions that people manage and utilize without the knowledge of the IT department, according to McAfee.\u00a0It also refers to simply any unauthorized uses of technology. The trend began with &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":3279,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-1384","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-chicago-it-support"],"yoast_head":"<title>What Is Shadow IT? Benefits and Risks of Unauthorized Tech<\/title>\n<meta name=\"description\" content=\"Shadow IT involves the use of unsanctioned programs and devices and can create serious security risks for your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Shadow IT? Benefits and Risks of Unauthorized Tech\" \/>\n<meta property=\"og:description\" content=\"Shadow IT involves the use of unsanctioned programs and devices and can create serious security risks for your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-30T19:00:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-04T21:45:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"What is Shadow IT?\",\"datePublished\":\"2015-04-30T19:00:51+00:00\",\"dateModified\":\"2021-06-04T21:45:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/\"},\"wordCount\":397,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology.jpg\",\"articleSection\":[\"Chicago IT Support\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/\",\"name\":\"What Is Shadow IT? Benefits and Risks of Unauthorized Tech\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology.jpg\",\"datePublished\":\"2015-04-30T19:00:51+00:00\",\"dateModified\":\"2021-06-04T21:45:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Shadow IT involves the use of unsanctioned programs and devices and can create serious security risks for your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology.jpg\",\"width\":2121,\"height\":1414,\"caption\":\"close up of person typing on a laptop with icons symbolizing technology.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Shadow IT?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"What Is Shadow IT? Benefits and Risks of Unauthorized Tech","description":"Shadow IT involves the use of unsanctioned programs and devices and can create serious security risks for your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/","og_locale":"en_US","og_type":"article","og_title":"What Is Shadow IT? Benefits and Risks of Unauthorized Tech","og_description":"Shadow IT involves the use of unsanctioned programs and devices and can create serious security risks for your business.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2015-04-30T19:00:51+00:00","article_modified_time":"2021-06-04T21:45:27+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology-1024x683.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"What is Shadow IT?","datePublished":"2015-04-30T19:00:51+00:00","dateModified":"2021-06-04T21:45:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/"},"wordCount":397,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology.jpg","articleSection":["Chicago IT Support"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/","name":"What Is Shadow IT? Benefits and Risks of Unauthorized Tech","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology.jpg","datePublished":"2015-04-30T19:00:51+00:00","dateModified":"2021-06-04T21:45:27+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Shadow IT involves the use of unsanctioned programs and devices and can create serious security risks for your business.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/11\/typing-with-illustrations-of-technology.jpg","width":2121,"height":1414,"caption":"close up of person typing on a laptop with icons symbolizing technology."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-is-shadow-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Shadow IT?"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1384"}],"version-history":[{"count":6,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1384\/revisions"}],"predecessor-version":[{"id":4449,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1384\/revisions\/4449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3279"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}