SYS-CON MEDIA Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, William Schmarzo, Dana Gardner

Article

How the Customer Experience Killed Shadow IT

IT must transform their role around the customer experience

Do you remember all the talk about ‘Shadow IT’?

Just a short time ago, it was a topic on the tip of every CIO’s tongue. Now, it almost never comes up in executive conversations and is rarely worthy of press headlines. The question, however, is why?

Have IT organizations vanquished this particular foe? Have they just given up the ghost and accepted that they’ve lost control?

Or is there a bigger phenomenon at play here?

Remembering Shadow IT


“I’m old enough to remember when we had shadow IT.” I heard this statement from a software company CEO just a while back. She continued, “It’s an old thing now. We’re evolving. IT is back on the table.”

The CEO’s point was that as the complexity of the IT stack has grown, the days of pulling out a credit card and buying a subscription to Salesforce were over. Her position was that with all the security concerns, the importance of data, and the ever-more-complex interweaving of applications to support the customer experience, business leaders need a specialist to help them sort through it all and are no longer willing to step out on their own.

Frankly, I don’t buy it.

From one perspective, the CEO is correct. The modern technology stack is infinitely more complex than at any time in our history. And that complexity has unquestionably led to increased security concerns and data integration demands among many other things that IT organizations must now handle.

Despite the need to deal with all of these issues, however, I don’t believe that business units have lost their appetite for taking control of their own IT destiny.

In fact, the reason I believe that we are no longer discussing shadow IT is not because there is an insignificant amount of IT-type activity occurring outside of the IT function. It’s just that the most progressive IT leaders have accepted them as legitimate IT functions and have welcomed them in from the shadows.

Out of the Shadows


I discussed this phenomenon in my first book, The Quantum Age of IT, over five years ago — before we were really talking about shadow IT.

At the time, I called it ‘the competition for IT’ and discussed how nervous business executives were coming to the dual realization that technology was now core to their survival and that the IT organization was incapable of moving fast enough or being agile enough to give them what they needed. So they were taking matters into their own hands.

IT organizations predictably responded by demanding that they stop — driving these business leaders into the proverbial shadows. But even then, progressive CIOs understood that trying to force all things technology to remain under the purview of IT was wrong-headed.

During a talk show series I did in conjunction with Intel several years ago, I had the opportunity to interview Patty Hatter, McAfee’s then CIO and COO, about this subject. She explained that when she took over the role of CIO, her team wanted her to crack down on the shadow IT running rampant in the organization.

Rather than attempting to force the shadow IT door closed, however, she explained to her team that trying to forcibly eliminate shadow IT was the wrong approach. Instead, she told them that they needed to build trust and demonstrate IT’s value — and then let everyone focus on where they could provide the most significant value to the organization.

Most progressive and future-minded IT leaders have come to the same realization. As technology has continued to evolve and become more intuitive, and as business leaders have become more technology savvy, organizations have been changing how they look at the entire lifecycle of technology acquisition, deployment, and management — and who is responsible for which parts of it.

Most importantly, IT and business leaders alike are recognizing that competitive advantage is going to those organizations who can most successfully enable the spread of IT far and deep into the enterprise to support and enhance the customer experience. And in that vision, there’s no concept of shadow IT.

A Customer-Centric View of IT


An organization’s ability to transform the digital experience is now the driving force behind competitive differentiation in the marketplace. As enterprise leaders have come to this realization, they have likewise recognized that they must deploy and leverage technology within every facet of the customer journey to create advantage.

Moreover, a new generation of intuitive, business-friendly tools is making it easier to move more of the technology footprint squarely into the hands of non-IT business units.

The evolution of technologies such as so-called no-code and low-code platforms, analytics tools designed for business consumption, and even cognitive engines that don’t require data scientists are all blurring the line that distinguishes when and where business units need IT.

At the same time, however, there is a growing recognition that delivering a differentiating experience throughout a customer’s journey is bigger than any one business unit or functional responsibility. In most organizations, in fact, IT is one of the few teams that participates in the entire end-to-end customer lifecycle.

Moreover, the customer experience spans the entire lifecycle of a customer’s engagement with an organization — and thus cuts across virtually every customer-facing and back-office functional unit. As such, it is essential that the modern enterprise eliminate the disconnects, communication failures, and baton-drops that have been endemic to the large enterprise from the beginning.

Today, customers will just not stand for an enterprise organization that cannot deliver a consistent and enjoyable experience throughout their engagement lifecycle — and certainly won’t accept the dated ‘it’s not our department’ excuses.

To meet these new expectations, therefore, the enterprise must leverage technology at every step of the customer journey, but must do it in a coordinated, cohesive fashion. As a result, they must maintain engagement-level awareness as customers engage with different parts of the organization.

In the end, IT leaders are finding that while they may no longer control everything technology-related within the enterprise, they have an even more critical role to play: protector of the customer experience.

The Intellyx Take


The customer experience depends upon many capabilities working together in concert. A customer’s data must flow seamlessly and fluidly among the systems with which they interact — and which employees are using to guide interactions. The enterprise must also maintain security and privacy throughout the process, but also not allow these concerns to get in the way of the experience itself.

IT is the only organization within the enterprise that can deliver on this promise. But IT cannot do so by attempting to control the totality of the technology stack. Instead, it must do just the opposite.

The modern IT organization must recognize that the right place to instantiate, deploy and manage technology is as close to the point of customer engagement as possible.

But it will be IT’s job to make sure that all of those pieces remain connected, agile, and dynamic so that the organization can deliver a winning customer experience now and then continuously adapt it over time as customer expectations shift.

Copyright © Intellyx LLC. Intellyx publishes the Agile Digital Transformation Roadmap poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. Image credit: Georgie Pauwels.

More Stories By Charles Araujo

Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He is a regular contributor to CIO.com and has been quoted or published in Time, InformationWeek, CIO Insight, NetworkWorld Computerworld, USA Today, and Forbes.

Latest Stories
Hackers took three days to identify and exploit a known vulnerability in Equifax’s web applications. I will share new data that reveals why three days (at most) is the new normal for DevSecOps teams to move new business /security requirements from design into production. This session aims to enlighten DevOps teams, security and development professionals by sharing results from the 4th annual State of the Software Supply Chain Report -- a blend of public and proprietary data with expert researc...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor will bring together the leading global 200 companies throughout the world of Cloud Computing, DevOps, IoT, Smart Cities, FinTech, Digital Transformation, and all they entail.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo...
ClaySys Technologies is one of the leading application platform products in the ‘No-code' or ‘Metadata Driven' software business application development space. The company was founded to create a modern technology platform that addressed the core pain points related to the traditional software application development architecture. The founding team of ClaySys Technologies come from a legacy of creating and developing line of business software applications for large enterprise clients around the ...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Automation is turning manual or repetitive IT tasks into a thing of the past-including in the datacenter. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In this session, you'll explore Nutanix APIs-from provisioning to other Day 0, Day 1 operations. Come learn about how you can easily leverage Nutanix APIs for orchestration and automation of infrastructure, VMs, networking, an...
Sanjeev Sharma Joins November 11-13, 2018 @DevOpsSummit at @CloudEXPO New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
It cannot be overseen or regulated by any one administrator, like a government or bank. Currently, there is no government regulation on them which also means there is no government safeguards over them. Although many are looking at Bitcoin to put money into, it would be wise to proceed with caution. Regular central banks are watching it and deciding whether or not to make them illegal (Criminalize them) and therefore make them worthless and eliminate them as competition. ICOs (Initial Coin Offer...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
The dream is universal: heuristic driven, global business operations without interruption so that nobody has to wake up at 4am to solve a problem. Building upon Nutanix Acropolis software defined storage, virtualization, and networking platform, Mark will demonstrate business lifecycle automation with freedom of choice and consumption models. Hybrid cloud applications and operations are controllable by the Nutanix Prism control plane with Calm automation, which can weave together the following: ...