Having provided virtual desktop and infrastructure solutions for over 11 years Evolve IP has seen a massive shift take place in the way IT is providing applications to end users. 11 years ago, customers were utilizing 90% client-server based software. Meaning companies would acquire a server, whether physical or virtual, install the application and then install the client on each user’s desktop.
Now, fast forward to today and I would argue that the number is down to around 25%. So, where are all those applications moving? It should be no surprise when I write ‘Software as a Service’ (SaaS). Companies like Salesforce.com, ADP, Concur, Outreach are all delivered via a browser with no software to install.
For the purposes of this post, I’ll be using the term “before” to describe how applications were delivered to end users in the “old days” and “after” to describe how applications are delivered now. Our first post looked at the changing role of Active Directory, the second showed how SaaS has caused IT to play Defense in the Wild West, and last we looked at BYOD and Remote Work.
Today, is the granddaddy of IT subterfuge … Illicit applications and Shadow IT
Just a few years ago, when it came to application implementation, IT held all the power. If Marketing wanted a new CRM, IT would need to technically bless the app, deploy it and then finally provide credentials to each user. Obviously, this is a very inefficient process and one of several reasons for the explosion of SaaS-based applications.
Application provisioning has dramatically changed with the explosion of SaaS. Today, that same Marketing team can deploy an entire tech stack in an afternoon with a credit card. Because there is little if any dependence on IT, organizations are finding more and more instances of “shadow IT”. In essence, functional areas are going out and utilizing applications without oversight from IT which leaves the organization extremely vulnerable.
Organizations have begun writing policies to try and curb this adoption but increased pressure from the business is causing employees to resort to what they think is best to achieve their specific needs losing sight of the overall impact to the business. Training and education workshops help, but IT leaders are left scratching their heads on the best way to deter this behavior.
Evolve IP has been working diligently to address the security defenses needed for businesses dealing with SaaS and Legacy line-of-business applications.
Evolve IP Workspaces include:
- Active Directory Integration – Control access to legacy and SaaS applications through AD
- Multi-factor Authentication – Increase security posture by requiring a second form of authentication
- BYOD Friendly – Allow employees to use any device while maintaining security controls
- Custom Toolbelt – Users get just the tools they need, the way they want them, increasing efficiency
- SSO and Self-Service Password Resets – Users adopt, and adhere to technologies that make their lives easier
- Full DaaS capabilities for power users
About Evolve IP
Evolve IP cloud solutions are proven to make users more productive, more mobile, more secure and less dependent on IT resources. Using the analyst-acclaimed Evolve IP OneCloud™ we deploy PurposeBuilt® Workspaces that unify collaboration and communications, SaaS and hosted applications, access management and contact centers. Integrating industry-leading technology partners like Microsoft, Cisco, Citrix and VMware, with our own intellectual property, our solutions have been deployed into thousands of enterprises and over 500,000 users around the globe; including into some of the world’s most well-known brands. We are fully invested in building lasting relationships with our clients because our success is built around businesses expanding their services within the Evolve IP OneCloud. This focus keeps us dedicated to driving successful client outcomes and has resulted in Evolve IP scoring consistently at the top of verified analyst and client satisfaction rankings.