Lack of appropriate skill sets and other factors drive some \u201cshadow IT\u201d cloud projects back into IT ownership. Still, cloud deployments outside the purview of IT continue to rise.\nIn enterprises with more than 1,000 employees, for example, nearly a quarter of cloud spending (23%) currently comes from outside IT, according to a 2014 IDG Enterprise Cloud Computing Study. And that figure is expected to grow five percentage points over the next three years.\nWhat does this trend mean for future cloud successes?\nNon-IT cloud spending in larger enterprises comes primarily from line-of-business management (35%) \u2013 from those who see an opportunity to innovate and don\u2019t want to wait for IT to start reaping the benefits. So it\u2019s in the best interest of the organization for IT to conduct some detective work to learn what is fueling decisions to circumvent IT to procure cloud services.\nOnce IT understands these reasons, it can get its house in order to successfully deliver what\u2019s needed on its own, removing the motivation for departments to venture out on their own. After all, despite growth in non-IT cloud spending, the lion\u2019s share of cloud investments still comes from IT.\nShadow IT does serve a purpose, and that is to push the organization forward when IT gets mired in the daily operational grind of maintaining the status quo. However, it is ultimately messier for IT to properly manage cloud projects when they originated outside of IT. The reasons are that shadow procurement:\n\nIs usually more costly.\u00a0 Duplicate subscriptions and services that don\u2019t receive the benefit of volume discounts could be rampant throughout the company.\nCan degrade app performance. The corporate Internet connection could get clogged with cloud traffic. Cloud use depends on network access. If IT doesn\u2019t account is in the dark about cloud services and doesn\u2019t account for them in its capacity planning, network pipes can fill up fast.\nCan increase your vulnerability to hacks. Shadow IT services aren\u2019t connected to your core directory structure. And users are prone to reusing their existing credentials with the new, non-IT-sanctioned service for the sake of convenience. Identical credentials to your core directory, then, can get loose in other systems, and that simply makes the risk of security breaches greater. IT can\u2019t manage these credentials because it doesn\u2019t know about them.\n\nTry to view shadow IT for what it is: a sign that IT can be doing something different, better, or more. Find out what that something is and do it. You\u2019ll save money, help users stay productive, and reduce risks. And you\u2019ll keep IT relevant in an era where it\u2019s easy for anyone in the company to procure IT services on their own.