08.11.2016 Views

The Technology Headline Mag8 Final9

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TOP 20 LEADING IoT SOLUTION PROVIDERS<br />

to support these Shadow IT initiatives instead of driving them even further underground.<br />

You can’t win a guerrilla war against Shadow IT. But you can absolutely use<br />

it as a guide to understand employee grievances and give them the right solutions.<br />

A good example is the use of personal cloud services by employees to store their<br />

corporate data. IT will never have full security control over a personal document<br />

storage app. However, a more inclusive and useful approach can be benificial.<br />

Separating the security method from the storage location allows documents to<br />

remain secure regardless of their location. This will help minimize the issues of<br />

Shadow IT as it allows staff to choose whatever IT service they need while mitigating<br />

the potential hazards of unregulated software. If employees are able to make the<br />

most of consumer technology and still guard against the threat of data loss, they<br />

should be allowed to do so.<br />

Forward-thinking CIOs harness Shadow IT<br />

<strong>The</strong> use of consumer apps outside of company policies is just the tip of the mobile<br />

iceberg. We are seeing a shift away from the traditional PC-based enterprise towards a<br />

Mobile First organization, in which all core business processes are available on-the-go.<br />

This model is centered on, and must support, the behavior of the employee. <strong>The</strong> user<br />

experience must be fantastic, and employees must be able to choose with device,<br />

operating system, or app best fit their needs. <strong>The</strong> security model is also very different.<br />

As a result, the CIO focused on lock-down as the core of the IT security model.<br />

Modern mobile operating systems are much more secure and user demands for<br />

<strong>The</strong> use of consumer<br />

apps outside of<br />

company policies is<br />

just the tip of the<br />

mobile iceberg<br />

new apps are much greater. As a result, the<br />

CIO must adopt a security model than enables<br />

user choice instead of one that restricts it.<br />

<strong>The</strong> statistics indicate that that consumerization<br />

is not a passing trend, and the breadth of<br />

consumer technologies available to employees<br />

will only increase. Those that fight<br />

Shadow IT will see that battle only become<br />

harder. Now is the time for the forward-thinking<br />

CIO to harness Shadow IT for the good of<br />

the organization and evolve it from a<br />

nightmare to a powerful tool for employee<br />

productivity.<br />

-36- October 2016

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!