Shadow technology: Four ways to reduce its use, minimize its impact

For years, the centralized IT department, responsible for managing all IT needs for the enterprise, has been losing power — and control of technology resources — within the corporate structure as it gets easier and easier for business units to purchase their own technology. C-level executives are grappling with how to react to the shadow IT dynamic. In this webcast presentation, Derek Lonsdale, IT transformation leader and Lean expert for PA Consulting, says that in order to reduce the use of shadow technology and minimize the disruption caused by it, centralized IT has four main tasks. Find out what those tasks are and get advice on how to tackle them.

The following is a transcript of the first of five parts of Lonsdale’s webcast presentation on shadow technology.

Derek Lonsdale: I always think about IT as the life cycle of plan, build and run, and the way you move into development and operations. And I think, today, businesses tend to buy external help for the build and run options within IT rather than the planning side, and it can be strategic purchasing of IT services or tactical purchasing of IT services, but we do know that the concept of having a centralized IT functionthat manages all of IT for the enterprise is virtually disappearing. In today’s virtual world it becomes much easier for businesses to buy their own IT and we’re certainly seeing lots of examples of this.

It’s not a random activity. We’ve seen some tactical purchases, but increasingly, many are strategic — [for example] Salesforce.com, Google Docs and others. … And we know that renegade IT, or shadow IT, comes with additional risk and potential inefficiencies, but the business [units] keep on doing it. And why do they insist on buying their own IT when they’ve got an IT department that can provide some of the services? And I think it’s fairly simplistic. The business buys IT because IT can’t do things fast enough for them. The business wants it faster and cheaper, they think they can get to the business outcome much faster than if they use their own IT department.

And I think IT does need to do some basic things. It needs to earn the right to deliver services. It has to fix the basics. Whether it’s server provisioning or onboarding or just desktop provisioning, it has to fix those basic things. It has to understand the business better. We know that technology is increasingly becoming more integral to the business outcome, and in some cases it is the business outcome. It’s likely to become more prevalent. We know that if IT doesn’t get to understand the business better and how the IT services can add value to the business, then renegade IT will probably get more and more used by the business.

So, even if IT transforms into a function that is entirely focused on adding value to the business, there’s still going to be some external partners that provide niche services that IT is just unable to compete with. And if that’s the case, I think we need to be able to embrace the change. Renegade IT is here, but what can IT do to improve it? Can they provide some subject matter expertise in IT design, in IT procurement, into managing relationships with third-party providers? There’s a whole bunch of things that IT can help with and if we embrace that change and provide that expertise, we are more likely to get the business on our side.

Improving governance and supporting processes to improve business and IT engagement … is all about the ways of working. And if we can provide a single point of contact for the business through good governance and have the supporting processes, then I think we can help improve the way that we work together.

One of my colleagues, Deepak Bharathan, wrote an article last December, and the title was a bit of a scary subject. It’s about cutting your IT budget — all of it. I know it’s forward looking, and it goes on to say, ‘Computers will vanish as they get embedded. Computing is already embedded in everything that we use, whether that’s communications, entertainment, transportation, fashion. No matter what company you work for, what product you dream of making, IT is omnipresent. Flashy gadgets [might] continue to wow us, but you’re more likely to see computing technology in everyday items, [like] clothes and toothbrushes.’

He finishes off by saying, ‘If technology is now an inherent part of all businesses, is it right to think about IT investment as if it was a separate bucket?’ And I think that thinking fits nicely to renegade IT. Can we afford to separate renegade IT from what we do within the rest of IT, or do we embrace it? And I think IT has a hard time demonstrating value to the business today and this increases instances of renegade IT.

But as I said earlier, there are risks and inefficiencies in renegade IT. So, how can [IT] make sure … that we’re included in every IT conversation with the business. I think it goes back to these four bullet points:

  • We need to earn the right to deliver services,
  • We absolutely need to understand the business better,
  • We need to embrace this change and provide some subject matter expertise, and
  • [We need to] improve the governance and supporting processes.

And there’s some roles within this governance that I’ll talk about a little bit later in more detail, [including] things like the business relationship managers — an essential role [in] managing the business and decreasing the use of renegade IT.

Questions about this webcast presentation on coping with shadow technology? Emailstroy@techtarget.com.

More on Enterprise ITIL and ITSM

  • canderson

    Fixing broken IT service management processes

    VIDEO – Find out why it’s so important for centralized IT departments to fix IT service management problems as part of their efforts to minimize and mitigate shadow IT.

  • canderson

    Understanding business processes helps ward off shadow IT

    VIDEO – Learn about the role understanding business-facing processes plays in buttressing the IT department to better compete against shadow IT.

  • canderson

    Internal vs. external customers? CIO Brook Colangelo doesn’t buy it

    VIDEO – At Houghton Mifflin Harcourt, IT is adopting ‘radical simplicity’ to better serve its internal and external customers.

  • #CIOChat: Taking shadow IT into the light

    News – Shadow IT doesn’t have to be in the shadows. As the debate over how to handle shadow IT continues, it’s often unclear how best to respond. Join #CIOChat on March 25 at 3 p.m. EST to discuss enterprise shadow IT management.( Mar 20, 2015 )

  • Embedded IT vs. central IT: Finding common ground

    Feature – ITSM expert George Spalding says that the key to solving problems between embedded IT and central IT is a common language based on services and not technology components.

  • project scope

    Definition – Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks and deadlines.

  • Three tips for a better IT service model

    Tip – With IT budgets moving out of the IT department, these three best practices will help put your IT organization in a better position to compete with outside IT services companies.

  • gap analysis

    Definition – A gap analysis is a technique used to assess the differences between the current and desired performance levels of a company’s systems or applications, as well as determine how to meet those requirements.

View the presentation at: http://bcove.me/jwj14sq6

Source: SearchCIO-Shadow technology: Four ways to reduce its use, minimize its impact

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s