Shadow SaaS | The risks of employee software purchases

Confidential information โ€“ personally identifiable data, customer data, trade secrets โ€“ circulates like a bloodstream through enterprise applications. With security breaches making daily news and regulations like GDPR and Sarbanes-Oxley proliferating, bad data security practices can land organisations in court and ruin reputations.

Hidden Risk: Employee SaaS Purchases

While a chief security officerโ€™s most important responsibility is making sure corporate data is safe and kept out of the wrong hands, thatโ€™s difficult to do when itโ€™s unclear how many SaaS apps are running in the environment and whoโ€™s accessing them.

A hidden risk that creates this gap is called Shadow SaaS โ€“ the ability for employees to pay for and start using SaaS apps easily, whether or not the apps are officially sanctioned. In fact, companies often have 15 times the number of SaaS apps in their environment than IT knows about. For example, a telecommunications company discovered $10 million worth of Shadow SaaS in its environment, including 295 unsanctioned products from 266 different vendors. According to Gartner, by 2020, a third of successful attacks experienced by enterprises will be on their Shadow IT resources.

Why? Easy to purchase

Todayโ€™s employees are used to simply purchasing what they need online, especially if itโ€™s fast and helps get things done. They may choose this easy and convenient route instead of going through a lengthy IT and purchasing process, often without an understanding of the bigger picture issues including security, volume discounts, licensing agreements and more. For example, a developer may purchase Elastic Compute Cloud (EC2) right from Amazon with a company or personal credit card. Employees commonly use free applications such as Google Docs and Dropbox to easily and quickly share information across their teams. The result is Shadow SaaS, where cloud accounts are used across the organisation and not managed from a safety and overall corporate view. In addition to breach vulnerability, costs (which includes staff time) can quickly head out of control.

How to Prevent the Risk of Shadow SaaS

As with most business challenges, a โ€œblock and tackleโ€ approach of setting up a process and taking advantage of IT asset automation can dramatically lower potential problems from Shadow SaaS.

The following six steps offer a path to control, not only for Shadow SaaS but also for hidden vulnerabilities across the company:

  • Start with a SaaS inventory. The old saying โ€œyou canโ€™t manage what you donโ€™t measureโ€ applies so well here. The first step is taking Shadow SaaS out of the shadows and creating a formal inventory.
  • Discover the risks. Using todayโ€™s vulnerability risk technology, you can uncover exactly where the risks exist. This insight enables you to apply precious resources and time to the right spots.
  • Find the threats that matter. Another advantage of modern vulnerability risk technology is that it can do more than tell you where the risks are. Youโ€™ll discover what risks are most important to help security and IT teams create a highly targeted plan of attack.
  • Review proper licensing. If the SaaS purchase didnโ€™t go through formal company processes, that also means you may not be on top of licensing. Itโ€™s possible to integrate a software licensing solution with your IT asset management system to bring to light important issues to proactively maintain license compliance.
  • Know your usage. In addition to licensing details, itโ€™s important to gain insight into actual usage of any Shadow SaaS. You may discover a tool widely used in the organisation that could benefit from a multiple-user subscription. Duplicate tools may emerge that could be combined.
  • Ask employees what they need. Since your employees live the day-to-day reality of what it takes to get projects done, they are a natural and great source of information about important technology needs. By checking in with different teams, youโ€™ll uncover information that can guide technology purchases.

Donโ€™t Say No, Empower Employees

Many companies have chosen a new programme: setting up an employee app store. Itโ€™s the best of both worlds. When you create an enterprise app store of approved software and services, you provide wins for employees and the company. An app store enables rapid access to important tools keeping productivity high, and employees empowered. And it also protects the organisation in multiple ways. IT can vet technology, formally inventory its existence and track vulnerabilities. Procurement can explore volume purchases, manage licensing and more. Employees win. The company wins.

While the โ€œshadowโ€ in SaaS may sound scary, it actually provides all sorts of opportunities to apply the latest technology โ€“ creating a more agile, action-oriented culture. Youโ€™ll also minimize security breaches while creating all the documentation you need to support compliance. Bringing SaaS out of the shadows means saying goodbye to risk, and hello to protection and opportunity.

Website | + posts

Vincent Smyth is Senior Vice President, EMEA at Flexera โ€“ responsible for driving increased revenue, market share and customer satisfaction in the Enterprise, Government, ISV and Intelligent Device marketplaces.

Unlocking Cloud Secrets and How to Stay Ahead in Tech with James Moore

Newsletter

Related articles

How AI is Transforming Customer Communication Management

Business communication has evolved over the years. Today, it's...

Investment Opportunities for Startups and Technologies in AIย 

Although artificial intelligence developed from niche technology has become...

Four Surprising Lessons I’ve Learned Leading Tech Teams

Techies. Geeks. Boffins. Whatever your organisation calls its IT...

A Business Continuity Cheat Sheet

Right, let's be honest. When you hear "business continuity,"...

Challenges of Cloud & Ultima’s Solution to Transform Business

With the way that AWS and Microsoft dominate technology...