Shadow IT Expanding Within Federal IT Environments
August 07, 2015

Joel Dolisy
SolarWinds

Share this

Shadow IT and mobile device use continues to expand within federal IT environments, while some IT pros lack control and confidence in their ability to manage the accompanying security risks, according to a SolarWinds survey on the current state of government IT management and monitoring. The survey also found that adoption and benefits of IT shared services are overcoming organizational resistance.

Not Enough Leadership Focus on Shadow IT

While only 12 percent of respondents indicated that shadow IT — when IT systems and solutions are built and used inside organizations without explicit organizational approval — is an area of high importance and leadership focus in their agency, nearly six in ten (58%) expect the use of shadow IT to increase in the next two years.

■ Shadow IT ranked second among areas that IT departments have least control over in terms of management and monitoring

■ Only 13 percent of respondents are very confident in their ability to protect against the negative consequences of shadow IT

■ A majority of respondents (71%) indicate that security consequences are the biggest issue with shadow IT, followed by duplication of IT efforts (50%), lack of interoperability (37%) and lack of adequate performance monitoring (36%)

■ Organizations using management and monitoring tools are significantly more confident than those who do not in their ability to protect against the negative consequences of shadow IT

Low Confidence in Data Protection Persists

Thirty-six percent of respondents indicate that only agency-owned mobile devices are allowed to access to their systems, but 80 percent of respondents still believe that mobile devices pose a threat to their agency’s security and 35 percent don’t provide security training for mobile device users.

■ Only 25 percent of respondents are very confident in their agency’s ability to effectively protect their organization’s data

■ The majority of respondents utilize data encryption (65%), firewall rule audits (60%), mobile device wiping (55%), mobile application inventory and authorization (52%), and two-factor authentication to secure mobile devices (52%), but at least 35 percent of respondent haven’t fully implemented any of these solutions

■ Respondents indicated that securing both the application and the device (43%) was the most challenging aspect of mobile technology security followed by ensuring devices are not infected by malware (37%) and that data is not accessed by unauthorized users (36%)

IT Shared Services Gain Traction and Deliver Benefits

Despite perceived concerns that IT shared services would compromise security, performance and control, more than half of respondents see them as beneficial to all agency stakeholders, including IT department personnel, end users, agency leadership and citizens/constituents .

■ Respondents rated the key benefits of shared services as saving money by eliminating duplication (60%), achieving economies of scale (54%) and standardized IT services for consistent performance (52%)

■ More than 80 percent believe that either an internal shared services model or an outsourced private partnership is most likely to provide superior customer service versus no shared services

■ The biggest widespread adoption barriers for shared services include cultural resistance to change (56%), perceived decreased flexibility (37%) and lack of executive buy-in (37%)

Fully securing a federal IT environment will undoubtedly remain a key concern for IT pros, and as control issues creep in with shadow IT and the mass adoption of mobile devices, security is brought to the management forefront. Agency leaders must not only provide their IT pros with the right tools to maintain control and security of their infrastructure, but remain flexible in considering operational and organizational changes like IT shared services that can help institute agency-wide security protocols and more.

“SolarWinds’ study provides detailed insight into how federal IT pros are adapting, managing and assuring oversight as shadow IT, mobile technology and shared services continue to grow in their environments,” concludes Laurie Morrow, Director of Research Services, Market Connections, Inc. “This research reinforces that fully implementing multiple management, monitoring and security tools provides significantly more control and confidence throughout IT organizations in the wake of this change.”

Joel Dolisy is CIO and CTO at SolarWinds.

Share this

The Latest

November 07, 2024

On average, only 48% of digital initiatives enterprise-wide meet or exceed their business outcome targets according to Gartner's annual global survey of CIOs and technology executives ...

November 06, 2024

Artificial intelligence (AI) is rapidly reshaping industries around the world. From optimizing business processes to unlocking new levels of innovation, AI is a critical driver of success for modern enterprises. As a result, business leaders — from DevOps engineers to CTOs — are under pressure to incorporate AI into their workflows to stay competitive. But the question isn't whether AI should be adopted — it's how ...

November 05, 2024

The mobile app industry continues to grow in size, complexity, and competition. Also not slowing down? Consumer expectations are rising exponentially along with the use of mobile apps. To meet these expectations, mobile teams need to take a comprehensive, holistic approach to their app experience ...

November 04, 2024

Users have become digital hoarders, saving everything they handle, including outdated reports, duplicate files and irrelevant documents that make it difficult to find critical information, slowing down systems and productivity. In digital terms, they have simply shoved the mess off their desks and into the virtual storage bins ...

November 01, 2024

Today we could be witnessing the dawn of a new age in software development, transformed by Artificial Intelligence (AI). But is AI a gateway or a precipice? Is AI in software development transformative, just the latest helpful tool, or a bunch of hype? To help with this assessment, DEVOPSdigest invited experts across the industry to comment on how AI can support the SDLC. In this epic multi-part series to be posted over the next several weeks, DEVOPSdigest will explore the advantages and disadvantages; the current state of maturity and adoption; and how AI will impact the processes, the developers, and the future of software development ...

October 31, 2024

Half of all employees are using Shadow AI (i.e. non-company issued AI tools), according to a new report by Software AG ...

October 30, 2024

On their digital transformation journey, companies are migrating more workloads to the cloud, which can incur higher costs during the process due to the higher volume of cloud resources needed ... Here are four critical components of a cloud governance framework that can help keep cloud costs under control ...

October 29, 2024

Operational resilience is an organization's ability to predict, respond to, and prevent unplanned work to drive reliable customer experiences and protect revenue. This doesn't just apply to downtime; it also covers service degradation due to latency or other factors. But make no mistake — when things go sideways, the bottom line and the customer are impacted ...

October 28, 2024

Organizations continue to struggle to generate business value with AI. Despite increased investments in AI, only 34% of AI professionals feel fully equipped with the tools necessary to meet their organization's AI goals, according to The Unmet AI Needs Surveywas conducted by DataRobot ...

October 24, 2024

High-business-impact outages are costly, and a fast MTTx (mean-time-to-detect (MTTD) and mean-time-to-resolve (MTTR)) is crucial, with 62% of businesses reporting a loss of at least $1 million per hour of downtime ...