Cisco purchases CloudLock: Eliminating shadow IT and solidifying cloud security

Cisco is furthering its focus on cloud security with the purchase of CloudLock Inc.

The cloud has unlocked a nearly unlimited number of benefits for today's enterprises. In addition to supporting remote access and enabling real-time collaboration, cloud resources have the power to boost employee productivity across the board. However, the cloud can also introduce certain challenges – especially when it comes to security.

Now, Cisco, a leader in the cloud solutions market, has announced plans to purchase security firm CloudLock. This deal underscores the importance of data protection in the cloud, as well as the criticality of preventing shadow IT.

The problem with the cloud: Shadow IT

While increased access can help support efficient working processes, it can also lead to gaps in security. Shadow IT, where employee users leverage platforms and resources that haven't been specifically vetted and approved by the company's IT team, is now a growing problem in the enterprise sector. As Computerworld contributor Robert Covington pointed out, this usually occurs when staff members are frustrated by a firm's existing cloud resources, and instead seek out other external applications to get work done.

"The problem usually continues with IT unaware, until technical problems develop, or until integration with other corporate applications is needed," Covington noted. "When IT is brought into the loop by users now needing help, it is not usually viewed as a pleasant surprise by the CIO or IT director."

Shadow IT is a growing problem in the enterprise industry. Shadow IT is a growing problem in the enterprise industry.

In this way, shadow IT processes can continue to fly under the radar for a considerable period of time, leaving the IT team in the dark when it comes to user activities. However, leveraging the corporate network and the company's other infrastructure resources to access unapproved platforms and sites can create serious problems. And when IT admins are finally brought into the loop, it could be too late.

Statistics tell a story

There are a number of stats that illustrate the deepening issue of shadow IT:

  • A recent Cisco survey found that while many company CIOs believe there are only around 51 cloud services being used by the business, there are actually closer to 730 cloud platforms being accessed and leveraged by employees.
  • Even IT team members participate in shadow IT: 83 percent of IT staff members admitted to using Software-as-a-Service apps that hadn't been approved by network admins, CIO Insight reported.
  • Many workers seek out shadow IT resources because they're more familiar with their use – 49 percent of business employees as well as 42 percent of IT staff cited familiar use as the motivation behind using non-approved apps.
  • In addition, 38 percent of line-of-business workers and 32 percent of IT employees noted that they participate in shadow IT because traditional approval processes take too long.

Whatever the reason, shadow IT has been a problem nearly since the emergence of the cloud. What's more, experts predict that this issue won't disappear anytime soon – in fact, shadow IT will only create more problems as enterprises continue to migrate more workloads to digital environments.

Cisco: Leading the way in cloud security

"There are actually 730 cloud platforms being accessed and leveraged by employee users."

Recently, Cisco unveiled Cisco Cloud Consumption as a Service, a platform that helps IT staff shine a light on all employee cloud activity, including that which hasn't been approved by admins. Now, Cisco is furthering its focus on cloud security with the purchase of CloudLock Inc.

The Wall Street Journal reported that Cisco is buying the startup for $293 million, and that the tech leader will even offer incentives for former CloudLock employees who join the Cisco team. CloudLock uses specialized technology to track employees' use of cloud services, as well as to help enforce existing usage policies and rules. In this way, shadow IT processes are easier to spot, and gaps in security from these activities can be identified and eliminated.

David Goeckeler, Cisco senior vice president, noted that even companies with the best cloud resources in place aren't immune to shadow IT.

"The issue in security is, it's not good enough to have a bunch of best-of-breed products," Goeckeler said.

To find out more about Cisco solutions, contact iT1 Source, a Cisco Premier Certified Partner, today. iT1 has everything your company needs for success, including solutions from the top names in the industry like Cisco. Our iT1 expert agents can help identify your business's unique needs and match you with the solutions that will make the most difference. For more information, contact one of our team members today.