Skip to main content
Shadow IT

Shadow IT


Shadow IT

Shadow IT, also called Stealth IT or Client IT, is hardware or software used within organizations without explicit organizational approval.

The cloud economy has made massive amounts of technology easily accessible to a huge base of corporate buyers. For example, it is now common to see smaller departments within a company -- or even individuals within a company -- independently procure and utilize SaaS solutions without explicit support from the IT department. Shadow IT refers to these types of technology initiatives that exist without the knowledge of the IT department. Shadow IT can introduce security risks and compliance concerns because it has not been officially vetted by the IT security team.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

Optiv Leadership Perspective – Insider Threat

Considering the role of insider threat can be a vital first step when looking to mitigate the risks of cyber breaches in an organization. Hear from Br...

See Details

January 13, 2016

Insider Threat Solution Primer

Read how mitigating insider threats presents a unique problem for information security leaders.

See Details

November 08, 2019

Insider Threat Workshop

This workshop is a 2–3 day onsite with organizational stakeholders, SMEs and Optiv consultants.

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.