shedding light on shadow itdownload.microsoft.com/download/6/1/c/61c0e37c-f252-4b33...shedding light...

16

Upload: others

Post on 27-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun
Page 2: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun
Page 3: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Shedding Light on Shadow IT

Microsoft Enterprise Architecture Round Table

Ramit Luthra, Karun Pothacamury, Donald Stahl, Tom Valva

October 16, 2014

Page 4: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

What is Shadow IT?

• Shadow IT are those technology related activities that are not controlled and administered by the “official” centralized IT function

• The centralized IT function believes that these activities are part of the IT organizations charter, and would normally be under its control

Page 5: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

What Drives Shadow IT?

• Shadow IT groups desire to operate independently of the centralized IT function for various reasons:

– Competitive drivers– Pressure to innovate– Availability of cloud services– Desire for independence– Enhanced productivity– Specialized domain knowledge– Control over the development life-cycle– Budget autonomy.

Page 6: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Types of Shadow IT – Rogue Efforts

• Rogue efforts are those IT projects that are intentionally hidden from the centralized IT organization

• Rogue efforts may be sponsored or unsponsored

• Rogue efforts use few IT resources from the centralized IT function

Page 7: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Types of Shadow IT – Skunk Works

– Skunk works are often sponsored

– Frees engineers from ‘structured’ approach to foster innovation

– If successful can be folded back into the centralized IT function

Page 8: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Types of Shadow IT – Black Ops

• Unsponsored efforts

• Usually smaller than skunk works projects

• Often driven by frustration with IT and backlogs

• May be of limited scope and use

• May go undetected for years

Page 9: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Types of Shadow IT – Purpose Driven

– Productivity needs are often the drivers of Purpose Driven efforts

– Often extensions to formal IT systems

– Frequently enabled by desktop technologies

– Often discovered when problems occur requiring IT intervention

– Cloud SaaS offerings encourage Purpose Driven efforts

Page 10: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Pros and Cons of Shadow IT

Practice Driven Pros:

- Better business alignment

- Unique value

- Natural agility

Practice Driven Cons:

- Infrastructure duplication

- Compliance Risk

Page 11: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Pros and Cons of Shadow IT

Rogue Effort Pros:- Highly innovative, creative

- Dedicated teams focus intensely

- Natural agility

Rogue Effort Cons:- Compliance & security Risk

- Lack of support

- Initial success may not scale

- May lack broad application

Page 12: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Pros and Cons of Shadow IT

Purpose Driven Pros:

- Often improve productivity

- Extend existing systems capabilities

- Can point to integration opportunities

- Don’t initially impact IT budget

Purpose Driven Cons:

- May eventually require IT support

- Duplication of effort

- Compliance Risk

Page 13: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Purpose

Driven

Efforts

Rogue

Efforts

Practice

Driven

Efforts

Traditional

IT

Services

• Traditional IT provides some but not all services, such as email, networking, directory and authentication.

• Rogue efforts tend to use a minimum IT services

• Practice and Purpose driven tend to use more services, such as server provisioning, but not application development and/or support

Figure: 1 Intersection of Traditional and Shadow IT

Page 14: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Architecture & Database Design

Purpose Driven

Practice Driven

TraditionalIT

RogueDevelopment

RequirementsAnalysis

Quality Assurance

User Acceptance Testing (UAT)

Software Development

RequirementsAnalysis

Quality Assurance

User Acceptance Testing (UAT)

Software Development

Architecture & Database Design

RequirementsAnalysis

Security Compliance

Quality Assurance

User Acceptance Testing (UAT)

Software Development

Architecture & Database Design

RequirementsAnalysis

I&O Support (servers, hosting, upgrades)

Security Compliance

Quality Assurance

User Acceptance Testing (UAT)

Software Development

Non-IT Developers, Testers, Architects, Analysts, SMEs IT Developers, Testers, Architects, Analysts, DBAs

IT Infrastructure and Operations AnalystsIndependent SaaS, PaaS, vendors, closets, etc.

IT Security AnalystsIndependent Security Analysts, disregarded

I&O Support (servers, hosting, upgrades

I&O Support (servers, hosting, upgrades

Architecture & Database DesignArchitecture &

Database DesignArchitecture &

Database Design

Service Providers:

Shadow IT Service Provider Model

Microsoft Enterprise Architecture Roundtable, 2014

Security Compliance Security Compliance

Figure: 2

I&O Support (servers, hosting, upgrades

Page 15: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun

Conclusions

• Shadow IT efforts arise out of need, and point to a lack of IT Services where they are not redundant

• Shadow IT efforts can point to how the organization wants to use technology

• Shadow IT can extend functionality and provide value without impacting the IT budget

• Rogue efforts can jump-start innovation

• Duplication of infrastructure, support, policy compliance, security present challenges to the organization

Page 16: Shedding Light on Shadow ITdownload.microsoft.com/download/6/1/C/61C0E37C-F252-4B33...Shedding Light on Shadow IT Microsoft Enterprise Architecture Round Table Ramit Luthra, Karun