eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
1How Shadow Analytics’ Growing Popularity Is Putting Companies at Risk
Shadow IT emerged in the past decade as a trend in which IT professionals solve technology problems themselves—usually with tools or services that are not vetted, secured or approved. Shadow analytics is an evolution and specialization of this trend—and also a security problem for organizations. Popular tools like Tableau, for example, make it easy for employees to analyze data, but accessing the data requires IT intervention. With shadow analytics, however, business users extract data from controlled sources into spreadsheets and other uncontrolled environments to access data more quickly, without waiting on IT. This eWEEK slide show, based on industry information from Tomer Shiran, CEO and co-founder of Dremio, which makes a new-gen data analytics platform for data scientists, takes an in-depth look at shadow analytics and the challenges it brings to IT.
2Shadow Analytics Is Growing in Popularity: What’s the Solution?
Shadow analytics is a major risk to the enterprise and a major burden on IT. The solution is not greater limitations on employees’ access to systems and tools. Instead, IT needs to embrace a model where users have self-service access to data using tools that make them more productive while governing their access.
3Data Resides Everywhere
4Copying All Data Into a Single Data Lake Is Impractical
5Self-Service BI Tools Have Made Users More Independent
6Accessing Data Is a Massive Challenge
7Data Consumers Are Creating New Risks for IT
8Shadow Analytics Removes the Ability to Control Access Centrally
9Shadow Analytics Increases Organizations’ Attack Surface
Unauthorized users seek vulnerabilities in an organization’s infrastructure to gain access to its systems and data. An important strategy in securing sensitive information is to make the attack surface area as small as possible. Shadow analytics, however, significantly increases the attack surface area because data is stored in environments that do not follow the vetted security controls of an organization’s core systems.
10Shadow Analytics Orphans Data From Changes at the Source
11Self-Service Data Can Maximize Safety and Productivity
As mentioned earlier, the solution is not greater limitations on employees’ access to systems or tools. Instead, IT needs to embrace a model where users have self-service access to data using tools that make them more productive while governing their access. In short, IT needs to remove the reasons why the business is taking risks to go around them.