New study from Cisco reveals ÍæÅ¼½ã½ãs are operating in the dark, failing to meet end users' needs for cloud applications and services. Credit: Thinkstock ÍæÅ¼½ã½ã Most ÍæÅ¼½ã½ãs have an inkling that employees in their enterprise have snuck a few applications past the IT department, but a new study by Cisco indicates that they are vastly underestimating the extent that unauthorized apps and services have infiltrated the network. Consulting with ÍæÅ¼½ã½ãs and analyzing network traffic in a set of large enterprises in a variety of industries, Cisco determined that the typical firm has on the order of 15 to 22 times more cloud applications running in the workplace than have been authorized by the IT department. [ Related: Why the Enterprise Cloud Needs Shadow IT to Succeed ] That level of pervasive shadow IT can create new security threats and introduce considerable waste into the enterprise, as employees in different business lines purchase duplicative services for common processes like storage and collaboration. “If they can’t see these cloud services being consumed, they can’t see the risk that’s being incurred,” says Bob Dimicco, global leader and founder of Cisco’s Cloud Consumption Service practice. “[If] you can’t see it, you really can’t manage it.” And by Cisco’s tally, there is quite a bit that ÍæÅ¼½ã½ãs aren’t seeing. On average, ÍæÅ¼½ã½ãs surveyed estimated that there were 51 cloud services running within their organization. According to Cisco’s analysis, the actual number is 730. [ Related: How ÍæÅ¼½ã½ãs can reduce shadow IT in government ] The lion’s share of the unauthorized cloud applications that Cisco identified fall into the categories of Software-as-a-Service or Infrastructure-as-a-Service, with platform-level applications a distant third. And it cuts across sectors. Even in highly regulated industries such as healthcare and financial services, Cisco found between 17 and 20 times more cloud applications running than the IT department estimated. “The shock to the ÍæÅ¼½ã½ã was the magnitude and the pervasiveness,” Dimicco says. “What was news here was, wow, this is happening in every industry, and in every industry the magnitude was much larger than what people expected.” Factors contributing to the rise of shadow IT Cisco points to a confluence of factors that have led to the rise of shadow IT, which Dimicco boils down to two overarching trends — “hyper-connectivity” and what he calls “hyper-distributed clouds,” where data can reside across an interconnected set of public and private deployments. “These are creating some unique problems for the ÍæÅ¼½ã½ã,” Dimicco says. “[T]he ÍæÅ¼½ã½ã looks at this landscape — it’s very different than what it was a couple years ago.” [ Related: Hillary Clinton is now the face of shadow IT ] Indeed, Cisco has documented a 21 percent increase in the volume of applications in use in the large enterprises it tracks just from the second half of 2014 to the first half of this year. How ÍæÅ¼½ã½ãs can deal with shadow IT So how is the ÍæÅ¼½ã½ã to respond to the surge in shadow IT? Dimicco outlines two broad options, and sees a clear choice. On the one hand, ÍæÅ¼½ã½ãs can turn a blind eye to the problem and continue to provision cloud services as they have been, which, it seems clear enough, is not meeting the needs of end users. Alternatively, he suggests that ÍæÅ¼½ã½ãs and other enterprise leaders rethink how their organizations approach IT on a fundamental level, and consider setting up new governance structures that would help bridge the gap between lines of business and the tech department. “Rather than trying to stop it, I’m going to look at it and say this represents hybrid IT,” he says. “It starts with discovering and identifying what’s being used,” Dimicco says, “and then taking that data and applying it to an informed cloud strategy so the IT organization can be a broker.” Dimicco notes that some organizations — including Cisco — have established something like a cloud governance board to help rein in shadow IT and ensure that end users are getting the applications and services that they need to do their job. ÍæÅ¼½ã½ãs can help that effort by setting up a catalog of approved cloud services that users can select from to speed up the provisioning process. “It’s really clear, employees and lines of business have spoken — they want choice, they want greater speed and agility,” Dimicco says. “IT has lost control here, because organizations, lines of business are saying I can go to the Web and get an application or a service within minutes and start being productive.” SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe