If you think you’ve finally gotten control of unsanctioned user apps, think again. The next wave of rogue apps is on its way from your data center to the cloud.
Over the years, the consumerization of IT has spurred a free-for-all in the adoption of cloud services. As employees found unsanctioned applications to help them do their jobs, overwhelmed security teams took a head-in-the-sand approach, giving rise to a serious problem dubbed “Shadow IT.” But how big of a problem is Shadow IT, really? That depends who you ask.
Based on my personal conversations, CIOs estimate the number of unsanctioned cloud apps to be around 100. But in a tally based on an analysis of network logs, Shadow IT totals are much larger –averaging roughly 1,000 cloud services in use since early 2015.
Since those early days, companies have taken a more proactive and managed approach to the cloud by moving to enterprise-wide deployments of applications like Office 365, Salesforce, and Box. But just as organizations think they have Shadow IT under control, a new area of rogue cloud computing has emerged: custom applications developed by a company on its own and hosted in the cloud.