• Enterprises should begin planning now for consumption monitoring and financial analytics systems , moving from their requirements to the right technologies for both areas .
The Value Shift for Enterprise IT , CIOs & Operations Teams
Since the emergence of cloud computing in 2008 , we ’ ve seen a shift , and then a reshift , in IT ’ s roles and responsibilities . The shift occurred as cloud computing rose in popularity and departments began to build and deploy their own IT solutions , typically leveraging public cloud-based technologies , including Amazon Web Services ( AWS ), Google and Salesforce . com , to name just a few .
A 2013 study conducted for McAfee by Stratecast , a unit of Frost & Sullivan , surveyed 300 IT workers and 300 line-of-business personnel at enterprises in the US , UK , Australia and New Zealand . The study found that 80 percent of both groups admit to using SaaS apps at work without IT ’ s approval . Despite the fact that many of these people are aware they ’ re circumventing IT approval processes and introducing potential risks , they feel that the business value outweighs any concerns . This type of usage became known as “ Shadow IT .”
Solving Shadow IT
The Shadow IT movement decentralized IT assets in many companies , and greatly diluted IT ’ s ownership of all IT resources in the enterprise . This led to inadequate security , governance and cost controls . As these risks became more apparent , business leadership saw the need to return control of all IT services to enterprise IT .
Chaos
Central Ownership and Responsibility
2012 2016
Figure 1 : While the use of cloud computing led to a rise in Shadow IT , and thus more decentralization of IT assets , in 2015 we saw a clear trend around the return of control to central IT .
As depicted in Figure 1 , control is now shifting back to central IT from something that was best defined as “ chaotic ” in most enterprises . All systems , cloud and non-cloud , will be placed under IT ’ s direct control . In many instances , IT had no say in or control over how these systems were built , deployed and man-
8 | THE DOPPLER | SUMMER 2016