5 Ways Solution Providers Can Deal With Shadow IT

Keep The IT Organization In The Loop

On the surface, this may seem sneaky – especially with a new client - if the requested purchase comes from outside IT.

“The easy policy to set is [that] all new services need to be approved by internal IT [or] security prior to being used,” said Gangwer, of Rook Security. “However, with the ease of sign-up and registration with cloud and SaaS services, this is becoming increasingly hard.”

For Gordon Martin, president of Peak UpTime, a solution provider based in Tulsa, Okla., having a longer-standing relationship can serve you well. If Peak UpTime has been working with a client for at least two years, Martin said, it informs the IT staff of an outside purchasing inquiry.