3 WAYS TO OUTSMART
SHADOW
Shadow IT. Stealth IT. BYOD. The facts are hard to
avoid. Employees frequently bypass IT to meet their
business needs with downloaded apps, personal
email, and unauthorized cloud services.
87%
72% of senior managers
regularly upload work
files to a personal email
of executives don’t
know how many or cloud account. i
Shadow IT applications
are being used within
their organization. ii
DANGERS
LURK IN THE
SHADOWS
Shadow IT puts information and systems at risk—while driving up
costs and making it difficult to manage IT governance and growth.
3 WAYS TO
OUTSMART
SHADOW IT
GIVE EMPLOYEES THE
CAPABILITIES THEY WANT.
Simplify work by giving people tools to collaborate on
documents and easily store and share large files.
80%
of IT professionals have
received employee requests
for file sharing and
iii
collaboration services.
37%
of users have uploaded
sensitive data to a file
sharing service. iv
ALLOW EMPLOYEES TO WORK
FROM ANYWHERE, ON ANY DEVICE.
Remove productivity blockers with tools that make work
easy on their favorite devices.
77%
of workers feel more productive
v
when working offsite.
240
The number of extra work
HOURS
hours each remote worker
vi
delivers per year.
GAIN VISIBILITY
INTO IT USAGE.
Detect threats by identifying high-risk activities and uncover
Shadow IT applications and unauthorized cloud storage.
83%
of CIOs experience some level
80%
of employees admit to using non-
viii
of unauthorized provisioning approved SaaS apps in their jobs.
of cloud services. vii
Of the 1000+ cloud services used by
enterprises, 44 are considered high
risk to the business. ix
Office 365 helps you outsmart Shadow IT with secure, scalable,
on-the-go productivity for today’s modern workplace.
See Office 365 at work in the
Modern Workplace webcast series at
www.modernworkplace.com
Office365.com
i “On the Pulse: Information Security Risk In American Business.” Stroz Friedberg. 2013.
https://www.strozfriedberg.com/wp-content uploads/2014/01/Stroz-Friedberg_On-the-Pulse_Information-Security-in-American-Business.pdf
ii Newman, Daniel. “2016: The State of Shadow IT.” Converge.xyz. February 9, 2016.
http://converge.xyz/2016-the-state-of-shadow-it
iii “Cloud Adoption Practices & Priorities Survey Report.” Cloud Security Alliance. January 2015.
https://downloads.cloudsecurityalliance.org/initiatives/surveys/capp/Cloud_Adoption_Practices_Priorities_Survey_Final.pdf
iv “Cloud Adoption and Risk Report Q4 2014.” Skyhigh. 2015.
https://uploads.skyhighnetworks.com/2015/03/Skyhigh-Cloud-Adoption-and-Risk-Report-Q4-2014-0315.pdf
v “Remote Collaborative Worker Survey.” ConnectSolutions. February 17, 2015.
http://connectsolutions.com/press-release/connectsolutions-survey-shows-working-remotely-benefits-employers-and-employees
vi Fogarty, Kevin. “5 Things You Need to Know about BYO Tech.” CIO.com. December 16, 2010.
http://www.cio.com/article/2412612/virtualization/5-things-you-need-to-know-about-byo-tech.html
vii Newman, Daniel. “2016: The State of Shadow IT.” Converge.xyz. February 9, 2016.
http://converge.xyz/2016-the-state-of-shadow-it
viii “The Hidden Truth Behind Shadow IT: Six Trends Impacting Your Security Posture.” Frost & Sullivan. November 2013.
http://www.mcafee.com/us/resources/reports/rp-six-trends-security.pdf
ix Starke, Joann. “The Shadow IT Dilemma.” Cisco Blogs. March 23, 2016.
http://blogs.cisco.com/cloud/the-shadow-it-dilemma