Having provided virtual desktop and infrastructure solutions for over 11 years Evolve IP has seen a massive shift take place in the way IT is providing applications to end users. 11 years ago, customers were utilizing 90% client-server based software. Meaning companies would acquire a server, whether physical or virtual, install the application and then install the client on each user’s desktop.
Now, fast forward to today and I would argue that the number is down to around 25%. So, where are all those applications moving? It should be no surprise when I write ‘Software as a Service’ (SaaS). Companies like Salesforce.com, ADP, Concur, Outreach are all delivered via a browser with no software to install.
For the purposes of this post, I’ll be using the term “before” to describe how applications were delivered to end users in the “old days” and “after” to describe how applications are delivered now. Our first post looked at the changing role of Active Directory, the second showed how SaaS has caused IT to play Defense in the Wild West, and last we looked at BYOD and Remote Work.
Today, is the granddaddy of IT subterfuge … Illicit applications and Shadow IT
Just a few years ago, when it came to application implementation, IT held all the power. If Marketing wanted a new CRM, IT would need to technically bless the app, deploy it and then finally provide credentials to each user. Obviously, this is a very inefficient process and one of several reasons for the explosion of SaaS-based applications.
Application provisioning has dramatically changed with the explosion of SaaS. Today, that same Marketing team can deploy an entire tech stack in an afternoon with a credit card. Because there is little if any dependence on IT, organizations are finding more and more instances of “shadow IT”. In essence, functional areas are going out and utilizing applications without oversight from IT which leaves the organization extremely vulnerable.
Organizations have begun writing policies to try and curb this adoption but increased pressure from the business is causing employees to resort to what they think is best to achieve their specific needs losing sight of the overall impact to the business. Training and education workshops help, but IT leaders are left scratching their heads on the best way to deter this behavior.
Remote Work Considerations – Securing the New Corporate Network
Evolve IP has developed a comprehensive solution that addresses the needs of the IT and the business. Workspaces enable mobility and security and give employees the tools they need to do their jobs in ways that make them more productive than ever.
Evolve IP has been working diligently to address the security defenses needed for businesses dealing with SaaS and Legacy line-of-business applications.
Evolve IP Workspaces include:
- Active Directory Integration – Control access to legacy and SaaS applications through AD
- Multi-factor Authentication – Increase security posture by requiring a second form of authentication
- BYOD Friendly – Allow employees to use any device while maintaining security controls
- Custom Toolbelt – Users get just the tools they need, the way they want them, increasing efficiency
- SSO and Self-Service Password Resets – Users adopt, and adhere to technologies that make their lives easier
- Full DaaS capabilities for power users
Enjoyed this post? Download all four sections of the Remote Work Considerations – Securing the New Corporate Network brief here. For more information about Workspaces please visit www.evolveip.net/workspaces or give us a call at 855-481-3798 for a demo.