Shadow ITIT SecurityIT Governance

What Is Shadow IT? Examples, Risks, and How to Manage It

Shadow IT is the use of unapproved apps and services without IT knowledge. Learn what causes it, real-world examples, and strategies to manage it.

Coax TeamSeptember 5, 202511 min read

Shadow IT Is Everywhere

Shadow IT is the use of information technology — hardware, software, or cloud services — without the knowledge or approval of the IT department. In 2026, it overwhelmingly means SaaS applications adopted by employees without going through official procurement or security review.

The scale is staggering. The average mid-market company with 200 employees uses over 250 SaaS applications. IT is aware of 30-40% of them. The remaining 60-70% — the shadow IT — operates outside security controls, compliance monitoring, and cost management.

Shadow IT is not new. Employees have always found ways to use tools that help them do their jobs. What's changed is the ease and velocity of adoption. Any employee with a corporate email can sign up for a SaaS tool in 30 seconds, start using it immediately, and never involve IT at all.

Common Shadow IT Examples

Shadow IT shows up in every department. Here are the most common examples:

Communication and Collaboration

  • A team sets up a Discord server for project communication instead of using the company's approved Slack or Teams workspace
  • An employee shares files via personal Google Drive because the corporate OneDrive feels slow
  • A department creates a Notion workspace for documentation when Confluence is the official tool

Productivity and Project Management

  • Marketing signs up for Monday.com when engineering already uses Jira and operations uses Asana
  • An employee starts using Trello for personal task tracking with corporate project data
  • A team adopts ClickUp for sprint planning without checking the approved software catalog

AI and Automation

  • Employees paste proprietary code, customer data, or strategic documents into ChatGPT, Claude, or Gemini without understanding data handling implications
  • A team builds workflows in Zapier or Make that move company data between unsanctioned services
  • Engineers use GitHub Copilot with corporate repositories without security review

This is the fastest-growing category of shadow IT — see our shadow AI guide for a deep dive.

File Storage and Sharing

  • Employees use personal Dropbox accounts to store and share work files
  • Teams share documents via WeTransfer or Google Drive links outside corporate controls
  • Contractors upload deliverables to their own cloud storage rather than the company's approved system

Department-Specific Tools

  • Marketing: Canva, Mailchimp, Buffer, HubSpot trials, analytics tools
  • Sales: LinkedIn Sales Navigator, Outreach, prospecting tools, personal CRM
  • Finance: Expense tools, invoice scanners, budgeting apps
  • HR: Scheduling tools, survey platforms, recruitment add-ons
  • Engineering: Code editors, testing tools, CI/CD add-ons, package registries

Why Employees Use Shadow IT

Understanding why shadow IT happens is essential to managing it effectively. Employees don't adopt unauthorized tools to be malicious — they do it to get work done.

1. The Approved Tools Don't Meet Their Needs

The most common reason. The official project management tool doesn't support the team's workflow. The approved design tool lacks a critical feature. The sanctioned file sharing system is too slow or too complex.

Employees optimize for productivity. If the official tool creates friction, they'll find one that doesn't.

2. Procurement Is Too Slow

When requesting a new tool takes weeks of approvals, security reviews, and committee meetings, employees bypass the process entirely. They need a solution today, not in six weeks.

3. They Don't Know What's Available

Most companies don't maintain an easily accessible catalog of approved software. If an employee needs a scheduling tool and doesn't know the company already has one, they'll sign up for Calendly on their own.

4. Free Tiers Remove All Barriers

Modern SaaS products are designed for bottom-up adoption. Free tiers let anyone sign up with a corporate email — no credit card, no purchase order, no approval. The tool is in use before anyone in IT knows it exists.

5. Remote Work Reduces Oversight

In an office, IT naturally observes what tools people use. Screen sharing in meetings reveals software. Casual conversations surface new adoptions. Remote work removes this passive visibility, and shadow IT flourishes.

The Risks of Shadow IT

Shadow IT creates four categories of risk:

Security Risks

Every unauthorized application is a potential entry point for attackers and a vector for data exfiltration:

  • Unvetted security posture: Shadow IT vendors haven't been assessed for encryption, access controls, or incident response capabilities
  • OAuth overexposure: Employees grant third-party apps broad access to corporate data (read email, access Drive files, view contacts) without understanding the implications
  • Credential reuse: Employees who sign up for shadow IT with their work email and a reused password create credential-stuffing attack vectors
  • No monitoring: Shadow IT has no SIEM integration, no audit logs accessible to the security team, and no anomaly detection

Compliance Risks

Regulations assume you know where your data is. Shadow IT makes that impossible:

  • GDPR: Requires a record of all data processors (Article 30) and Data Processing Agreements with each (Article 28). Shadow IT vendors process personal data without DPAs
  • NIS2: Requires supply chain risk management. Unvetted shadow IT vendors are a direct NIS2 compliance gap
  • SOC 2 / ISO 27001: Require an inventory of all information assets and logical access controls. Shadow IT exists outside both

Financial Risks

Shadow IT is expensive in ways that are often invisible:

  • Duplicate spending: Multiple teams paying for tools that serve the same purpose
  • Wasted licenses: No central tracking means no license reclamation when employees leave or stop using a tool
  • Missed volume discounts: Fragmented purchasing prevents negotiating enterprise pricing
  • The full picture: Shadow IT waste is a major component of SaaS sprawl

Operational Risks

  • Data silos: Information trapped in tools IT can't access or integrate
  • Onboarding confusion: New employees face a fragmented landscape with no clear guidance
  • Offboarding gaps: Departing employees retain access to shadow IT accounts indefinitely
  • Support burden: IT gets support requests for tools they've never heard of

How to Discover Shadow IT

Manual methods — surveys, interviews, expense report reviews — catch a fraction of shadow IT. Effective discovery requires automation:

Discovery Methods

MethodWhat It CatchesCoverage
Email metadata analysisAny SaaS sending signup confirmations, invoices, notifications70-80%
Identity provider / SSO logsApps connected via OAuth, SAML, or OIDC40-60%
OAuth token auditingApps granted access to Google Workspace or Microsoft 36550-70%
Financial data analysisPaid SaaS appearing in credit card and expense data30-50%
Network traffic analysisAny web application accessed from corporate network80-90% (on-network only)

The best approach combines multiple methods for maximum coverage. No single method catches everything. A SaaS management platform that integrates several discovery methods typically achieves 90%+ visibility.

What to Do When You Find Shadow IT

Discovery is step one. What comes next determines whether you manage shadow IT effectively:

  1. Classify by risk tier: Not all shadow IT is equally dangerous. A free survey tool with no data access is different from an AI assistant processing customer data
  2. Assess the top risks first: Focus security review on applications handling sensitive data or with broad OAuth permissions
  3. Decide: sanction, replace, or remove: Some shadow IT deserves to become official. Some should be replaced with an approved alternative. Some must be removed immediately
  4. Communicate, don't punish: Shadow IT happens because people are trying to work effectively. Build processes that channel that motivation through safe, governed pathways

How to Manage Shadow IT Long-Term

Blocking shadow IT entirely is counterproductive — it just drives adoption further underground. The goal is managed enablement: making it easy to adopt safe tools and hard to use risky ones.

Build a Lightweight Procurement Process

  • Fast-track for low-risk tools (no sensitive data, few users): approve or deny within 48 hours
  • Standard track for medium-risk tools: 1-week review including basic security assessment
  • Full review for high-risk tools (sensitive data, broad access, compliance implications): 2-3 weeks with thorough security evaluation

Maintain an Approved Software Catalog

Publish a searchable list of vetted, approved tools organized by category. When employees can quickly find "here's our approved project management tool," they're far less likely to sign up for a random alternative.

Implement Continuous Monitoring

Set up automated discovery that catches new shadow IT as it appears — not during quarterly audits. The faster you know about a new unauthorized tool, the faster you can assess and address it.

Empower, Don't Block

The most effective shadow IT strategies focus on removing the reasons employees go shadow in the first place:

  • Make approved tools work well and be easy to access
  • Make the procurement process fast and transparent
  • Listen to feedback when employees say approved tools don't meet their needs
  • Treat shadow IT discoveries as signals about unmet needs, not policy violations

Shadow IT Metrics to Track

MetricWhat It Tells You
Total applications (known vs. unknown)Overall visibility gap
New shadow IT discovered per monthTrend direction — is the problem growing or shrinking?
Time to discoveryHow quickly are new unauthorized apps detected?
Shadow IT with sensitive data accessHighest-priority security risk
Shadow IT resolution rate% of discovered apps sanctioned, replaced, or removed within 30 days
OAuth permissions exposureBreadth of data access granted to unauthorized apps

The Bottom Line

Shadow IT isn't going away. The SaaS model makes tool adoption frictionless, and employees will always optimize for getting their work done. The question isn't how to eliminate shadow IT — it's how to discover it fast, assess it accurately, and govern it proportionally.

Start with visibility. You can't manage what you can't see. Implement automated shadow IT discovery that gives you a real-time picture of every application in your environment. From there, classify by risk, build governance that's fast enough to actually be used, and monitor continuously.

The companies that manage shadow IT well don't have less of it — they just know about it, control the risks, and turn the best shadow IT into officially supported tools. Learn more about how Coax approaches SaaS security.


Want to see how much shadow IT is in your organization? Book a demo and get a complete discovery report in 15 minutes.

Ready to take control of your SaaS stack?

See your full SaaS landscape — shadow IT, wasted spend, and security gaps — in 15 minutes.

Related Articles