Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light...
Transcript of Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light...
![Page 1: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/1.jpg)
![Page 2: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/2.jpg)
![Page 3: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/3.jpg)
Shedding Light on Shadow IT
Microsoft Enterprise Architecture Round Table
Ramit Luthra, Karun Pothacamury, Donald Stahl, Tom Valva
October 16, 2014
![Page 4: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/4.jpg)
What is Shadow IT?
• Shadow IT are those technology related activities that are not controlled and administered by the “official” centralized IT function
• The centralized IT function believes that these activities are part of the IT organizations charter, and would normally be under its control
![Page 5: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/5.jpg)
What Drives Shadow IT?
• Shadow IT groups desire to operate independently of the centralized IT function for various reasons:
– Competitive drivers– Pressure to innovate– Availability of cloud services– Desire for independence– Enhanced productivity– Specialized domain knowledge– Control over the development life-cycle– Budget autonomy.
![Page 6: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/6.jpg)
Types of Shadow IT – Rogue Efforts
• Rogue efforts are those IT projects that are intentionally hidden from the centralized IT organization
• Rogue efforts may be sponsored or unsponsored
• Rogue efforts use few IT resources from the centralized IT function
![Page 7: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/7.jpg)
Types of Shadow IT – Skunk Works
– Skunk works are often sponsored
– Frees engineers from ‘structured’ approach to foster innovation
– If successful can be folded back into the centralized IT function
![Page 8: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/8.jpg)
Types of Shadow IT – Black Ops
• Unsponsored efforts
• Usually smaller than skunk works projects
• Often driven by frustration with IT and backlogs
• May be of limited scope and use
• May go undetected for years
![Page 9: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/9.jpg)
Types of Shadow IT – Purpose Driven
– Productivity needs are often the drivers of Purpose Driven efforts
– Often extensions to formal IT systems
– Frequently enabled by desktop technologies
– Often discovered when problems occur requiring IT intervention
– Cloud SaaS offerings encourage Purpose Driven efforts
![Page 10: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/10.jpg)
Pros and Cons of Shadow IT
Practice Driven Pros:
- Better business alignment
- Unique value
- Natural agility
Practice Driven Cons:
- Infrastructure duplication
- Compliance Risk
![Page 11: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/11.jpg)
Pros and Cons of Shadow IT
Rogue Effort Pros:- Highly innovative, creative
- Dedicated teams focus intensely
- Natural agility
Rogue Effort Cons:- Compliance & security Risk
- Lack of support
- Initial success may not scale
- May lack broad application
![Page 12: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/12.jpg)
Pros and Cons of Shadow IT
Purpose Driven Pros:
- Often improve productivity
- Extend existing systems capabilities
- Can point to integration opportunities
- Don’t initially impact IT budget
Purpose Driven Cons:
- May eventually require IT support
- Duplication of effort
- Compliance Risk
![Page 13: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/13.jpg)
Purpose
Driven
Efforts
Rogue
Efforts
Practice
Driven
Efforts
Traditional
IT
Services
• Traditional IT provides some but not all services, such as email, networking, directory and authentication.
• Rogue efforts tend to use a minimum IT services
• Practice and Purpose driven tend to use more services, such as server provisioning, but not application development and/or support
Figure: 1 Intersection of Traditional and Shadow IT
![Page 14: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/14.jpg)
Architecture & Database Design
Purpose Driven
Practice Driven
TraditionalIT
RogueDevelopment
RequirementsAnalysis
Quality Assurance
User Acceptance Testing (UAT)
Software Development
RequirementsAnalysis
Quality Assurance
User Acceptance Testing (UAT)
Software Development
Architecture & Database Design
RequirementsAnalysis
Security Compliance
Quality Assurance
User Acceptance Testing (UAT)
Software Development
Architecture & Database Design
RequirementsAnalysis
I&O Support (servers, hosting, upgrades)
Security Compliance
Quality Assurance
User Acceptance Testing (UAT)
Software Development
Non-IT Developers, Testers, Architects, Analysts, SMEs IT Developers, Testers, Architects, Analysts, DBAs
IT Infrastructure and Operations AnalystsIndependent SaaS, PaaS, vendors, closets, etc.
IT Security AnalystsIndependent Security Analysts, disregarded
I&O Support (servers, hosting, upgrades
I&O Support (servers, hosting, upgrades
Architecture & Database DesignArchitecture &
Database DesignArchitecture &
Database Design
Service Providers:
Shadow IT Service Provider Model
Microsoft Enterprise Architecture Roundtable, 2014
Security Compliance Security Compliance
Figure: 2
I&O Support (servers, hosting, upgrades
![Page 15: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/15.jpg)
Conclusions
• Shadow IT efforts arise out of need, and point to a lack of IT Services where they are not redundant
• Shadow IT efforts can point to how the organization wants to use technology
• Shadow IT can extend functionality and provide value without impacting the IT budget
• Rogue efforts can jump-start innovation
• Duplication of infrastructure, support, policy compliance, security present challenges to the organization
![Page 16: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun](https://reader033.fdocuments.net/reader033/viewer/2022052800/5f0f31a77e708231d442f3d4/html5/thumbnails/16.jpg)