Help Center

Swif

2024 Shadow IT Report

This report reveals how organizations tackle Shadow IT, the tools they rely on, the challenges they face, and the opportunities for innovation.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Who Participated in This Report?

25%

50-200 employees

16.7%

201-500 employees

8.3%

501-1,000 employees

50%

Fewer than 50 employees

Organizational Sizes Represented in the Survey

Organizations of varying sizes participated in this survey

34%

Healthcare

8%

Education

8%

Aviation

50%

Technology

Industry Sectors Represented in the Survey

Respondents span a variety of industries

Key Roles Represented by Survey Participants

Survey respondents range from IT specialists to decision-makers

8.3%

Software
Developer

8.3%

Co-Founder

8.3%

Systems Administrator

33.3%

IT Manager/Director

25%

CISO/Security Analyst

8.3%

Operations
Manager

8.3%

CTO

Device Management

Preferred Device Types Managed by Organizations

Organizations manage a range of devices, with a focus on these platforms

macOS

Windows

Linux

Chromebook

iOS/iPadOS

Android

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

91.7%
91.7%
58.3%
58.3%
25%

33%

2-3

25%

None

41.7%

1

Number of MDM Tools Used by Organizations

MDM tools play a crucial role in managing devices

Different tools for differentoperating systems

Legacy systems still in use

Specialized tools for certainteams or regions

None used

0%

10%

20%

30%

40%

50%

60%

70%

66.7%
16.7%
16.7%

Reasons for Using Multiple MDM Tools

Organizations cited these reasons for relying on multiple MDM tools

Shadow IT

50%

We don’t actively
monitor Shadow IT

25%

Manual review by IT teams

8.3%

Network
monitoring tools

16.7%

Endpoint detection
and response (EDR)tools

Methods Used to Identify Shadow IT

Organizations use various techniques to detect unauthorized applications

50%

10-25%

33.3%

Less than 10%

8.3%

26-50%

8.3%

More than 50%

Employee Usage of Unsanctioned Applications

Shadow IT activity varies among employees

Top Concerns About Shadow IT

Organizations are most concerned about these risks

Security risks (e.g., databreaches)

Compliance issues

Increased IT workload

Loss of control over
sensitive data

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

75%
75%
25%
83.3%

Current Strategies for Managing Shadow IT Risks

Organizations adopt diverse approaches to tackle Shadow IT risks

Educating employees
about sanctioned tools

Blocking unauthorized applications

Monitoring network activity

Using specialized software

Not really on our radar
at the moment

We don't manage currently

BitDefender

MDR solutions

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

75%
33.3%
41.7%
8.3%
8.3%
8.3%
8.3%
8.3%

Future Opportunities and Gaps

Key Features Desired in Shadow IT Management Solutions

Organizations want tools with these essential capabilities

Automatic detection of
unauthorized apps

Real-time compliance monitoring

Real-time monitoring from SSO logs
(Google Workspace, Okta, etc.)

Centralized visibility
across alldevices

Centralized visibility across
all browser types

Integration with existing tools (e.g., EDR, compliance platforms)

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

100%
75%
50%
75%
58.3%
58.3%

33%

Limited compliance
automation

8.3%

We don't currently use
device management tools

8.3%

We don't use any

8.3%

Lack of unified management
across platforms

16.7%

High cost

25.5%

Difficult setup and
maintenance

Challenges Faced with Current Device Management Tools

MDM tools play a crucial role in managing devices

33.3%

No

66.7%

Yes

Interest in Swif for Device Securityand Shadow IT Solutions

Organizatisecurity and simplify managementons cited these reasons for relying on multiple MDM tools

Download Free Report

Use Swif for free

Use Swif for free if you have up to 5 employees. Get a custom quote based on your company's size.