Shadow ITSaaS ManagementIT Security

The Complete Guide to Shadow IT Discovery

Shadow IT costs mid-market companies millions in wasted spend and security gaps. Learn how to discover, assess, and manage unauthorized SaaS applications across your organization.

Coax TeamJanuary 15, 20258 min read

What Is Shadow IT?

Shadow IT refers to any software, application, or cloud service used within an organization without the explicit knowledge or approval of the IT department. In the age of SaaS, this has become one of the largest unmanaged risks for mid-market companies.

The average mid-market company uses 3-4x more SaaS applications than IT is aware of. Employees sign up for tools with a corporate email, connect them to company data, and never tell anyone. The result? A sprawling landscape of unknown applications, each one a potential security vulnerability and a line item nobody is tracking.

Why Shadow IT Is Growing

Several trends have accelerated the growth of shadow IT:

  • Self-service SaaS: Most tools offer free tiers or trial periods that require nothing more than an email address
  • Remote and hybrid work: Distributed teams adopt tools independently to solve immediate problems
  • Departmental budgets: Marketing, sales, and HR teams purchase software with department credit cards, bypassing IT procurement
  • Speed over process: Employees choose convenience over compliance when IT approval processes are slow

The Real Cost of Shadow IT

Shadow IT isn't just a security concern — it's a financial one.

Wasted Spend

When departments buy tools independently, duplication is inevitable. Your marketing team might be paying for Canva Pro while design already has a Figma Enterprise license that includes similar features. Multiply this across every department and the waste adds up fast.

On average, companies waste 30% of their SaaS budget on duplicate, unused, or underutilized licenses.

Security Vulnerabilities

Every unauthorized application is a potential entry point for attackers. Shadow IT applications often:

  • Store sensitive company data without proper encryption
  • Lack compliance with your organization's security policies
  • Use OAuth tokens that grant broad access to corporate systems
  • Are never updated or patched by IT

Compliance Gaps

For companies subject to GDPR, SOC 2, or ISO 27001, shadow IT creates audit nightmares. You can't demonstrate compliance for applications you don't know exist.

How to Discover Shadow IT

There are several approaches to uncovering shadow IT, each with different levels of coverage and effort.

1. Email Log Analysis

The most effective method for SaaS discovery. By analyzing email metadata (sender domains, not content), you can identify every SaaS service that has sent a confirmation email, invoice, or notification to any employee.

Pros: Catches virtually every SaaS app, including free tiers and trials Cons: Requires access to email system (Google Workspace or Microsoft 365)

2. Identity Provider Audit

Review your Azure AD, Okta, or Google Workspace logs for OAuth application grants. This shows which third-party apps employees have authorized with their corporate credentials.

Pros: Shows actual access permissions granted Cons: Only catches apps that use SSO or OAuth; misses standalone signups

3. Network Traffic Analysis

Monitor DNS queries and network traffic to identify connections to known SaaS domains. This works well for on-premise environments but is less effective with remote workers.

Pros: Real-time visibility Cons: Doesn't work well for remote/hybrid teams; privacy concerns

4. Expense Report Mining

Review corporate credit card statements and expense reports for SaaS subscriptions. This catches paid applications but misses free tiers and trials.

Pros: Direct cost visibility Cons: Misses free apps; labor-intensive; delayed discovery

5. Employee Surveys

Ask employees what tools they use. Simple but unreliable — people forget, underreport, or don't realize a tool counts as "software."

Pros: Easy to implement Cons: Highly incomplete; relies on self-reporting

Building a Shadow IT Discovery Program

The most effective approach combines multiple methods. Here's a practical framework:

Step 1: Automated Discovery

Start with email log analysis and identity provider audits. These two methods together will uncover 90%+ of your SaaS landscape with minimal manual effort.

Step 2: Risk Assessment

Once you have a complete inventory, categorize each application by:

  • Data sensitivity: Does it access customer data, financial records, or intellectual property?
  • User count: How many employees are using it?
  • Redundancy: Does it overlap with an approved tool?
  • Compliance: Does it meet your security and privacy requirements?

Step 3: Policy and Governance

Create clear policies for SaaS procurement:

  • Define an approval workflow that takes days, not weeks
  • Publish an approved software catalog
  • Set up automated alerts for new application signups
  • Review and rationalize your SaaS portfolio quarterly

Step 4: Continuous Monitoring

Shadow IT isn't a one-time problem. New applications appear every week. Implement continuous monitoring to catch new signups as they happen, not months later during an audit.

What to Look for in a Discovery Tool

If you're evaluating shadow IT discovery solutions, prioritize these capabilities:

  • Agentless deployment: No software to install on employee devices
  • Email and IdP integration: Covers the two highest-signal data sources
  • Automatic categorization: Identifies app purpose, risk level, and spend
  • Continuous monitoring: Real-time alerts for new applications
  • Cost tracking: Links discovered apps to actual spend data
  • GDPR compliance: Especially important for European companies

The Bottom Line

Shadow IT is not a problem you can ignore. Every day it goes unaddressed, your company accumulates more wasted spend, more security vulnerabilities, and more compliance gaps.

The good news: with the right approach and tools, you can go from zero visibility to a complete SaaS inventory in hours, not months. The key is starting with automated discovery and building a sustainable governance program around it.


Ready to discover your shadow IT? Book a demo and see your full SaaS landscape in 15 minutes.

Ready to take control of your SaaS stack?

See your full SaaS landscape — shadow IT, wasted spend, and security gaps — in 15 minutes.