{"id":32974,"date":"2023-09-25T09:09:47","date_gmt":"2023-09-25T13:09:47","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=32974"},"modified":"2025-03-18T07:08:44","modified_gmt":"2025-03-18T11:08:44","slug":"what-is-shadow-it-will-ai-make-this-more-challenging","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/","title":{"rendered":"What is Shadow IT? Will AI make this more challenging?"},"content":{"rendered":"<div class=\"inner_content\">\n<h2><span class=\"ez-toc-section\" id=\"What_is_Shadow_IT\"><\/span>What is Shadow IT?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Shadow IT is a term used to describe IT systems, applications, or services that are used within an organization without the explicit approval, knowledge, or oversight of the IT department or the organization&#8217;s management. It typically arises when employees or departments adopt and use software, hardware, or cloud services for their specific needs without going through the official IT procurement or security processes.<\/p>\n<p style=\"margin-bottom: 15px;\">As the nomenclature &#8220;shadow&#8221; implies &#8211; these IT activities exist in the background or hidden from the official IT infrastructure and support. Whilst it can mean dark and sinister things are afoot \u2013 often it is simply employees using an application without IT\u2019s knowledge. However, while individuals or teams may resort to shadow IT with good intentions, such as finding quick solutions to address their specific needs or improving productivity, it can also create several challenges and risks for the organization, including:<\/p>\n<ul>\n<li><strong>Security risks:<\/strong> Shadow IT often lacks proper security controls and may expose sensitive data or systems to potential breaches, hacks, or data leaks. When a solo employee subscribes to a SaaS app to perform a certain task it is unlikely that they will also put in place a procedure to delete their access when they leave a company and transfer access to a colleague.<\/li>\n<li><strong>Data loss:<\/strong> When IT systems are not centrally managed, data may be stored in unsecured locations, leading to data loss or accidental data deletion. It may not even be an actual data deletion problem simply that the one individual who implemented a tool leaves the company and nobody else knows where the data is or the account login details.<\/li>\n<li><strong>Unreliable \/ Flaky supplier:<\/strong> Many SaaS based apps are produced by startups and small companies and run on rented co-lo or cloud hardware. If the company goes bust in a poofy cloud of venture capital fueled smoke or gets hacked &#8211; you have a problem.<\/li>\n<li><strong>Unsupported or unpatched:<\/strong> Freeware version of tools easily accessible to the individual often come with no support commitments, can be withdrawn on a whim, may not feature certain security features and may even be the test system for the commercial paid version of the tool and not subject to the same security hardening, patching and testing as the paid version.<\/li>\n<li><strong>Lack of integration:<\/strong> Shadow IT applications may not be well-integrated with the rest of the organization&#8217;s systems, leading to data silos and inefficiencies. Folks may cut-n-paste bits of information into the official systems which become desynchronized from the reality of what is happening in practice.<\/li>\n<li><strong>Compliance issues:<\/strong> Organizations may face compliance and legal problems when using unapproved software or services that fail to meet regulatory requirements. SaaS tools with web frontends are often hosted in a US cloud and don\u2019t meet GDPR type compliance needs in Switzerland or Germany. Increasingly potential customers are including RFI (Request for Information) questions that include whether a supplier has processes in place to approve and evaluate applications they use.<\/li>\n<li><strong>Increased costs:<\/strong> The use of multiple uncoordinated IT solutions can lead to duplication of efforts and increased costs for the organization. Many SaaS tools are free to encourage uptake but when used in anger at scale will require an upgrade to a paid tier.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-32981 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/diagram.png\" alt=\"Graphic showing risks from shadow IT. 7 risks are shown - Security, increased costs, data loss, Unreliable supplier, compliance issues, lack of integration, unsupported or unpatched\" width=\"442\" height=\"454\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/diagram.png 442w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/diagram-292x300.png 292w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/diagram-310x318.png 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/diagram-140x144.png 140w\" sizes=\"auto, (max-width: 442px) 100vw, 442px\" \/><\/p>\n<p>At the extreme of the \u201cShadow IT\u201d spectrum is something I called \u201cBlack Hole IT\u201d, stuff the IT team has zero visibility on because folks are using applications and infrastructure completely out of corporate control \u2013 for example: communicating with colleagues or customers on personal mobile phones for calls or via personal WhatsApp.<\/p>\n<p>Organizations unaware of shadow IT usage or who fail to address it may incur hefty regulatory fines and face lawsuits that damage their brand reputation, see: <a href=\"https:\/\/www.nytimes.com\/2023\/08\/08\/business\/banks-fines-whatsapp-records.html\" target=\"blank\" rel=\"noopener\">Banks Fined $549 Million Over Use of WhatsApp and Other Messaging Apps &#8211; The New York Times (nytimes.com).<\/a><\/p>\n<p>For another take on the potential costs of Shadow IT, see: <a href=\"https:\/\/www.techtarget.com\/searchcio\/tip\/potential-costs-of-shadow-IT\" target=\"blank\" rel=\"noopener\">14 potential costs of shadow IT | TechTarget.<\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"SaaS_and_Cloud_fuel_Shadow_IT\"><\/span>SaaS and Cloud fuel Shadow IT<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Cloud services, especially SaaS, have become a significant category of shadow IT. With a wealth of services and apps available, often as freeware, in many organizations staff members routinely install and use them without involving the IT group.<\/p>\n<p>Ideally, everyone in an organization should understand SaaS tools need to be vetted and assessed by qualified individuals. We recently wrote an article to help IT teams assess SaaS vendors and products, see: <a href=\"https:\/\/www.eginnovations.com\/blog\/should-i-trust-a-saas-vendor-or-product\/\">Should I Trust a SaaS Vendor or Product?.<\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_applications_are_frequently_used_as_Shadow_IT\"><\/span>What applications are frequently used as Shadow IT?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"margin-bottom: 15px;\">Several types of applications are frequently found as shadow IT within organizations, the most commonly found are:<\/p>\n<ul>\n<li><strong>Cloud storage and file-sharing services:<\/strong> Employees often turn to cloud storage and file-sharing platforms like Dropbox, Google Drive, or OneDrive to store and share files conveniently. These services provide easy access to files from various devices but may not always comply with the organization&#8217;s security policies.<\/li>\n<li><strong>Messaging and collaboration tools:<\/strong> Employees may use instant messaging platforms like Slack or Microsoft Teams to communicate and collaborate with colleagues. While these tools can improve team productivity, their use outside official channels may pose data security risks.<\/li>\n<li><strong>Note-taking and productivity apps:<\/strong> Tools like Evernote, Trello, or Asana are commonly used by employees to organize tasks, notes, and projects, which may not be approved or supported by the IT department.<\/li>\n<li><strong>Personal email accounts:<\/strong> Employees might use personal email accounts, such as Gmail or Yahoo Mail, for work-related communications when they feel the official email system is too restrictive or inconvenient.<\/li>\n<li><strong>Project management software:<\/strong> Various project management tools like Basecamp, Wrike, or Monday.com can help teams organize and track projects, even if they haven&#8217;t been vetted or approved by IT. Often, only paid higher tiers offer enterprise security features and these may not be compatible with existing company strategy e.g., based around Google SSO where an organization has a Microsoft SSO strategy.<\/li>\n<li><strong>Video conferencing tools:<\/strong> With the rise of remote work, employees may adopt video conferencing tools like Zoom, Skype, or Google Meet without the IT department&#8217;s explicit approval.<\/li>\n<li><strong>Analytics and data visualization tools:<\/strong> Business analysts and data-savvy employees may use tools like Tableau, Power BI, or Google Analytics for data analysis and reporting.<\/li>\n<li><strong>Personal productivity software:<\/strong> Individual employees might use personal productivity tools like Microsoft Office 365 or Google Workspace to streamline their work, even if the organization hasn&#8217;t officially adopted them.<\/li>\n<li><strong>Image processing apps:<\/strong> There are a wealth of free tools out there that can jazz up photos or generate diagrams \/ infographics for websites and PowerPoint presentations \u2013 but if the slide an employee sends to them is your confidential finance briefing slide or your top-secret silicon chip IP diagrams \u2013 you have a potential security and \/ or compliance issue.<\/li>\n<li><strong>AI technologies and tools:<\/strong> Many are turning to consumer-friendly AI tools such Chat-GPT and using them in a similar way to google especially to write marketing and documentation. However, beyond this some are using it to re-write code which means they are inputting their own code (and potentially company proprietary IP) into such systems. Some other file sharing tools such as Dropbox will use customer data for training AI tools too, alibi only with consent \u2013 however whether the person consenting understands what they are doing may be questionable if the IT team isn\u2019t involved.<\/li>\n<li><strong>BYOD:<\/strong> Use of personal laptops, tablets and smartphones (BYOD, or \u201cbring your own device\u201d) is widely considered to also constitute shadow IT, especially if those devices are used for work purposes without following company protocols.<\/li>\n<\/ul>\n<p>For those interested in corner-cases and nuances, Evan Schuman\u2019s article is insightful, see: <a href=\"https:\/\/www.computerworld.com\/article\/3697788\/the-shadow-it-fight-2023-style.html\" target=\"blank\" rel=\"noopener\">The shadow IT fight \u2014 2023 style | Computerworld.<\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Is_AI_a_concern_for_Shadow_IT\"><\/span>Is AI a concern for Shadow IT?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Very much so. It was widely reported how Samsung workers unwittingly leaked proprietary and confidential data by using ChatGPT to help them with tasks. Engineers at Samsung\u2019s semiconductor arm used the AI tool to help fix problems with their source code. But in doing so, the workers inputted data, such as new in-development source code and internal meeting notes data relating to their hardware. See: <a href=\"https:\/\/www.techradar.com\/news\/samsung-workers-leaked-company-secrets-by-using-chatgpt\" target=\"blank\" rel=\"noopener\">Samsung workers made a major error by using ChatGPT | TechRadar.<\/a><\/p>\n<p>A succinct summary on this growing genre of Shadow IT is covered in: <a href=\"https:\/\/www.osibeyond.com\/blog\/shadow-it-chatgpt-generative-ai-security\/\" target=\"blank\" rel=\"noopener\">Shadow IT Is Growing in the Age of ChatGPT.<\/a><\/p>\n<p>EUC veteran Brian Madden has also written on this subject and the challenges in trying to close this particular Pandora\u2019s box, see: <a href=\"https:\/\/www.linkedin.com\/pulse\/consumerization-roars-back-time-have-ai-brian-madden\/\" target=\"blank\" rel=\"noopener\">The Consumerization of IT roars back, and this time they have AI! | LinkedIn.<\/a><\/p>\n<p>Brian Jackson at Forbes recently wrote about how many organizations are now taking steps to implement policies and controls around LLM (Large Language Model) type AI applications such as Chat-GPT, see: <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2023\/04\/27\/how-to-avoid-fueling-shadow-ai-with-the-right-policy-for-generative-ai-chatbots\/\" target=\"blank\" rel=\"noopener\">How To Avoid Fueling \u2018Shadow AI\u2019 With The Right Policy For Generative AI Chatbots (forbes.com).<\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_can_you_solve_the_Shadow_IT_problem\"><\/span>How can you solve the Shadow IT problem?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Shadow IT is fundamentally a cultural problem. To address shadow IT, organizations need to look to fostering a culture of openness and collaboration between IT and other departments. IT departments need to be approachable and responsive, working with employees to understand their needs and providing approved alternatives that meet those requirements.<\/p>\n<p>Implementing appropriate IT governance, policies, and security measures can help minimize the risks associated with shadow IT while still enabling innovation, creativity and efficiency. However, most Shadow IT issues are caused by well-meaning employees simply not understanding the implications of their actions and staff training and education is probably the most effective approach.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_do_people_use_Shadow_IT\"><\/span>Why do people use Shadow IT?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"margin-bottom: 15px;\">To tackle Shadow IT, you need to understand the motivations of those who are installing software without involving the IT team. Some common reasons people might engage in Shadow IT include:<\/p>\n<ul>\n<li><strong>Speed and Agility:<\/strong> Shadow IT can allow departments or individuals to quickly adopt tools and technologies they believe will improve their productivity without waiting for IT department approval, which may involve lengthy processes.<\/li>\n<li><strong>Specialized Needs:<\/strong> Some teams have specific needs that they feel standard IT solutions cannot adequately address. They might turn to Shadow IT to find tools that better align with their unique requirements.<\/li>\n<li><strong>Ease of Use:<\/strong> Some employees may find certain technologies or software solutions more intuitive or user-friendly than what the IT department provides, making them more likely to use those tools. New employees may naturally wish to use the same familiar tools they had provided at a previous employer rather than overcome the learning curve associated with unfamiliar tools.<\/li>\n<li><strong>Lack of Awareness:<\/strong> In some cases, employees might not be aware of the official IT-approved tools that could fulfill their needs, leading them to find their own solutions. Many employees will have little understanding of the work that IT departments do to assess tools for longevity, backup and security.<\/li>\n<li><strong>Perceived Bureaucracy:<\/strong> Organizations with complex or slow IT approval processes might drive employees to adopt Shadow IT as a way to bypass what they perceive as unnecessary red tape.<\/li>\n<li><strong>Experimentation:<\/strong> Employees might experiment with new tools or services to see if they can enhance their productivity or find innovative ways of solving problems.<\/li>\n<li><strong>Siloed Information:<\/strong> Different departments or teams might have their own technology budgets or resources, leading to the adoption of tools without central IT oversight.<\/li>\n<li><strong>Remote Work and Mobility:<\/strong> The rise of remote work and mobile technologies has made it easier for employees to access and adopt tools that might not be officially sanctioned by IT.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"How_can_an_organization_tackle_the_challenges_of_Shadow_IT\"><\/span>How can an organization tackle the challenges of Shadow IT?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Organizations need to strike a balance between enabling employees to find tools that enhance their productivity and maintaining proper governance, security, and control over their technology landscape.<\/p>\n<p style=\"margin-bottom: 15px;\">To address Shadow IT, organizations can take several steps, such as:<\/p>\n<ul>\n<li><strong>Communication and Education:<\/strong> Educate employees about the approved IT solutions and their benefits, so they are aware of the resources available to them. Ensure employees are trained to use any tools provided.<\/li>\n<li><strong>Streamlined Approval Processes:<\/strong> Make IT approval processes more efficient to prevent frustration and delays that might lead to Shadow IT adoption.<\/li>\n<li><strong>Collaboration:<\/strong> Foster collaboration between IT and other departments to understand their needs and work together to find suitable solutions.<\/li>\n<li><strong>Security Measures:<\/strong> Implement robust security measures and policies to protect against potential security vulnerabilities introduced by unauthorized tools.<\/li>\n<li><strong>Block SaaS URLs:<\/strong> Most organizations maintain black and\/or whitelists of websites and services they do not want employees using. This can be effective both in preventing the use of SaaS tools and alerts individuals to the fact they may be doing something unsanctioned. Tools such as eG Enterprise will allow you to monitor browser usage and URLs accessed if required.<\/li>\n<li><strong>Centralized Management:<\/strong> Provide a centralized platform or portal where employees can request new tools or technologies, allowing IT to evaluate and approve them if appropriate.<\/li>\n<li><strong>Regular Audits:<\/strong> Periodically assess the technology landscape to identify and address any Shadow IT that might have been adopted. Tools such as Microsoft Defender for Cloud Apps can help organizations assess Shadow IT exposure, see: <a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-cloud-apps\/tutorial-shadow-it\" target=\"blank\" rel=\"noopener\">Discover and manage Shadow IT &#8211; Microsoft Defender for Cloud Apps | Microsoft Learn.<\/a><\/li>\n<li><strong>Monitor for Signs of Shadow IT in use:<\/strong> Employee behavior and workflows continuously evolve alongside the IT tools themselves. Good observability and monitoring tools can give insights into the first signs of Shadow IT usage. Monitoring official UC (Unified Communication) tools usage can be insightful, if employees are rarely using the provided tool such as <a href=\"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-microsoft-teams\/\">MS Teams<\/a> it is often worth investigating how they are communicating.<\/li>\n<\/ul>\n<div class=\"containers mb-4\" style=\"clear:both\">\n \t<div class=\"fixed-free-trial-div mb-3\" id=\"fixedsectioninfo_blog_btn\">\n \t\n \t<style>.containers_hide_row,.all_blogs_bottom{\n \tdisplay:none;\n   \n}\t<\/style>\n                <div class=\"box-style container row pt-4 pb-4  animatedParent animateOnce\" data-sequence=\"100\" style=\"border-bottom: 1px solid #ddd;border-top: 1px solid #ddd;background: #4b4b4b;padding: 15px 15px 0 15px;border-radius: 12px;\">\n                \n                <div class=\"text-center animated fadeIn go\"> \n                <p class=\"text-center mb-4\" style=\"    color: #fff;\">\n\neG Enterprise is an Observability solution for Modern IT. Monitor digital workspaces, <br\/>web applications, SaaS services, cloud and containers from a single pane of glass.\n<\/p>\n                <\/div>\n                    <div class=\"text-center pb-1 animated fadeIn go\" data-id=\"8\">\n                        <a class=\"border-btnhead-eg\"  href=\"https:\/\/www.eginnovations.com\/it-monitoring\/free-trial\"> <span style=\"font-family: GraphikMedium!important;color: #fff;\">Free Trial<\/span><\/a>\n                        <a href=\"https:\/\/www.eginnovations.com\/product\/application-performance-monitoring\" class=\" border-btnhead-eg\" style=\"width:230px;   \"> <svg width=\"24\" height=\"24\" style=\"margin-top:-3px\" version=\"1.1\" id=\"Layer_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\n\t viewBox=\"0 0 26.5 26.5\" style=\"enable-background:new 0 0 26.5 26.5;\" xml:space=\"preserve\">\n<style type=\"text\/css\">\n\t.st2{fill:#fff !important;stroke:#fff !important;stroke-miterlimit:10;}\n\t\n\t\t.border-btnhead:hover .st2 {\n  fill: #ffffff !important;\n  stroke: #ffffff;\n}\n<\/style>\n<g>\n\t<g>\n\t\t<path class=\"st2\" d=\"M13.3,25.8c-6.9,0-12.5-5.6-12.5-12.5S6.4,0.8,13.3,0.8s12.5,5.6,12.5,12.5S20.2,25.8,13.3,25.8z M13.3,1.8\n\t\t\tC6.9,1.8,1.8,6.9,1.8,13.3S7,24.8,13.3,24.8s11.5-5.2,11.5-11.5S19.6,1.8,13.3,1.8z M11.2,18.1c-0.2,0-0.4-0.1-0.6-0.2\n\t\t\tc-0.3-0.2-0.6-0.6-0.6-1V9.7c0-0.4,0.2-0.8,0.6-1c0.3-0.2,0.8-0.2,1.2,0l6.2,3.6c0.3,0.2,0.6,0.6,0.6,1s-0.2,0.8-0.6,1l-6.2,3.6\n\t\t\tC11.6,18,11.4,18.1,11.2,18.1z\"\/>\n\t<\/g>\n<\/g>\n<\/svg> <span style=\"font-family: GraphikMedium!important;color: #fff;\">&nbsp;See the platform<\/span><\/a>\n                    <\/div>\n                <\/div>\n                \n                 <\/div>\n            <\/div>\n<h2><span class=\"ez-toc-section\" id=\"Learn_More\"><\/span>Learn More<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/blog\/2022\/08\/11\/5-tips-for-managing-shadow-it\/\" target=\"blank\" rel=\"noopener\">5 Tips for Managing Shadow IT | CSA (cloudsecurityalliance.org)<\/a><\/li>\n<li>Monitoring Microsoft Teams and similar tools can reveal Shadow IT communications, see: <a href=\"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-microsoft-teams\/\">Microsoft Teams Monitoring \u2013 Tools &amp; Strategies (eginnovations.com).<\/a><\/li>\n<li>Taking an app-centric approach can be one part of a strategy to counteract Shadow IT usage, with the side-benefits of improving the digital employee experience, see: <a href=\"https:\/\/www.eginnovations.com\/blog\/application-centric-euc-monitoring-is-key-to-digital-employee-experience-dex\/\">Application-Centric EUC Monitoring is Key to Digital Employee Experience (DEX) | eG Innovations.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is Shadow IT? Shadow IT is a term used to describe IT systems, applications, or services that are used within an organization without the explicit approval, knowledge, or oversight of the IT department or the organization&#8217;s management. It typically arises when employees or departments adopt and use software, hardware, or cloud services for their [&hellip;]<\/p>\n","protected":false},"author":33,"featured_media":32987,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[371,369,366,375,383],"tags":[58,165,166,2113,494],"class_list":["post-32974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-performance-monitoring-apm","category-cloud-monitoring","category-end-to-end-monitoring-e2e","category-general","category-it-infrastructure-monitoring","tag-business-service-management","tag-it-security-and-compliance","tag-it-security-audit","tag-shadow-it","tag-system-administrator"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Shadow IT? Will AI make this more challenging? | eG Innovations<\/title>\n<meta name=\"description\" content=\"Shadow IT describes systems, apps, or services used without explicit approval, knowledge, or oversight of the IT department or management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Shadow IT? Will AI make this more challenging? | eG Innovations\" \/>\n<meta property=\"og:description\" content=\"Shadow IT describes systems, apps, or services used without explicit approval, knowledge, or oversight of the IT department or management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-25T13:09:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T11:08:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/Shadow-IT-social_banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Ferioli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/Shadow-IT-social_banner.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Ferioli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Shadow IT? Will AI make this more challenging? | eG Innovations","description":"Shadow IT describes systems, apps, or services used without explicit approval, knowledge, or oversight of the IT department or management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/","og_locale":"en_US","og_type":"article","og_title":"What is Shadow IT? Will AI make this more challenging? | eG Innovations","og_description":"Shadow IT describes systems, apps, or services used without explicit approval, knowledge, or oversight of the IT department or management.","og_url":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2023-09-25T13:09:47+00:00","article_modified_time":"2025-03-18T11:08:44+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/Shadow-IT-social_banner.jpg","type":"image\/jpeg"}],"author":"Mike Ferioli","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/Shadow-IT-social_banner.jpg","twitter_creator":"@eginnovations","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Mike Ferioli","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/"},"author":{"name":"Mike Ferioli","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/387d1cbc233ef47dda14a8668875830f"},"headline":"What is Shadow IT? Will AI make this more challenging?","datePublished":"2023-09-25T13:09:47+00:00","dateModified":"2025-03-18T11:08:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/"},"wordCount":2289,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/Shadow-IT-Thumbnail.jpg","keywords":["Business Service management","IT Security and Compliance","IT Security Audit","Shadow IT","System administrator"],"articleSection":["Application Performance Monitoring (APM)","Cloud Monitoring","End-to-End Monitoring (E2E)","General","IT Infrastructure Monitoring"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/","url":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/","name":"What is Shadow IT? Will AI make this more challenging? | eG Innovations","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/Shadow-IT-Thumbnail.jpg","datePublished":"2023-09-25T13:09:47+00:00","dateModified":"2025-03-18T11:08:44+00:00","description":"Shadow IT describes systems, apps, or services used without explicit approval, knowledge, or oversight of the IT department or management.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/Shadow-IT-Thumbnail.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2023\/09\/Shadow-IT-Thumbnail.jpg","width":362,"height":235,"caption":"Shadow-IT-Thumbnail"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Shadow IT? Will AI make this more challenging?"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/387d1cbc233ef47dda14a8668875830f","name":"Mike Ferioli","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b167470be73abda24848ac6c9d4b602?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b167470be73abda24848ac6c9d4b602?s=96&d=mm&r=g","caption":"Mike Ferioli"},"url":"https:\/\/www.eginnovations.com\/blog\/author\/mike-ferioli\/"}]}},"modified_by":"eG Innovations","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/32974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=32974"}],"version-history":[{"count":0,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/32974\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/32987"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=32974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=32974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=32974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}