ALL >> Computers >> View Article
How Shadow It Is Reshaping The Role Of The Cio
It used to be that IT departments chose the technology and devices employees used. They purchased volume licenses of client software like Microsoft Office and large enterprise software programs that they installed on expensive hardware in data centers they managed. In the last 10 years, however, there has been a surge in free or low cost consumer services that allow people to accomplish many of the same things as traditional enterprise software. Employees also expect to be able to use the latest smart phones and tablets, and have all their information available on any device, from anywhere in the world with an internet connection.
The traditional role of the CIO as the gatekeeper of technology is changing as a result. IT departments which used to be focused solely on building and running internal infrastructure are struggling to keep up in a world where employees can use thousands of cloud services. With cloud services, even though the responsibility for running the application and provisioning hardware is transferred to the provider, the CIO is still responsible for regulatory compliance and corporate governance for ...
... enterprise data stored in the cloud. As a result, CIOs have found themselves in the unpopular position of saying “no” to the cloud services employees feel they need to do their jobs.
However, when you block popular cloud services like Dropbox or Skype, people are motivated to find a way around you. At the same time as IT is struggling with new expectations of what it’s role should be in the company. The challenge for CIOs 5-10 years ago was providing the same IT services internally with fewer resources. They looked to outsourcing and offshoring to reduce cost and improve corporate margins. Now the expectation is that IT should be actively collaborating with other areas of the company to find creative ways to grow the business. To accomplish this, CIOs will need to embrace cloud services and proactively identify new ways to enable employees to be more productive and reach their customers in a new way.
This transformation will likely result in the IT organization shrinking in terms of headcount but increasing in its influence. CIOs will need to build stronger relationship with their C-level peers and the board. Today, the majority of CIOs (77%) see partnering with the Chief Marketing Officer (CMO) as critical to success, but far fewer CMOs (57%) agree this alignment is important. The first step of this transformation includes understanding the scope of Shadow IT usage across the organization to assess how business units are embracing new technology.
There are thousands of cloud services available and the first step is understanding which ones are being used by employees. The average company uses 545 different cloud services, each with differing levels of risk. IT departments need to assess the risks of services objectively in order to understand which ones are enterprise-ready and therefore should be promoted and supported across the organization. This exercise not only reduces overall risk and improves compliance, it can also improve collaboration. The average organization uses 19 different file sharing services. It becomes very difficult to share documents for different projects when they’re split across Box, Dropbox, Hightail, and Egnyte. Standardizing on one or two services can accelerate collaboration and the company can benefit from volume licensing compared to individual teams buying the service on a corporate credit card.
Another way to look at this shift for IT is to look at how supply chains have evolved over the last 20 years. Vertically integration has given way to an ecosystem of just-in-time parts suppliers and low cost shipping worldwide. IT should think about its mandate the same way. There is an ecosystem of cloud that must be selected and work together to drive the business forward. By focusing on the business objectives and less on the actual day to day infrastructure maintenance, the CIO becomes a much more strategic part of the business and company itself benefits.
Author :
Skyhigh Networks, the cloud access security company, enables companies to embrace Cloud Analytics Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information on Shadow IT to Visibility and Cloud Control, visit us at http://www.skyhighnetworks.com/shadow-it/ or follow us on Twitter@skyhighnetworks.
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech