In the popular mockumentary series What We Do in the Shadows, the characters are occasionally confronted with “Jerry”—a vampire who has been living in the basement for decades, largely forgotten but still very much a part of the household’s ecosystem. In the world of enterprise technology, “Jerry” represents Shadow IT. It is the unsanctioned software, the personal cloud storage accounts, the unmanaged messaging apps, and the unauthorized AI tools that employees use daily without the knowledge or approval of the central IT department.

Like the character in the basement, Shadow IT is often ignored until it causes a problem. However, in an era defined by rapid digital transformation and the “consumerization” of software, understanding “what we do in the shadows” is no longer optional. For modern organizations, the challenge lies in identifying these hidden digital assets and transforming them from security liabilities into drivers of innovation.
The Anatomy of the Basement: Defining Shadow IT in the Modern Workplace
Shadow IT refers to any technology—hardware, software, or cloud services—used within an organization without explicit approval from the IT department. While the term once referred primarily to physical hardware (like a personal router plugged into an office wall), it has evolved into a predominantly software-based phenomenon.
The Rise of the SaaS Sprawl
The barrier to entry for new technology has never been lower. In the past, deploying a new tool required a physical installation, significant capital expenditure, and the direct involvement of systems administrators. Today, all an employee needs is a corporate credit card and an email address to sign up for a powerful Software-as-a-Service (SaaS) platform. This ease of access has led to what analysts call “SaaS Sprawl,” where a single company may have hundreds of active subscriptions, many of which are unknown to the Chief Information Officer (CIO).
Why Employees Go “Into the Shadows”
It is a mistake to view Shadow IT as an act of rebellion. In most cases, employees turn to unauthorized tools because they are trying to be more productive. If the official corporate file-sharing tool is slow or cumbersome, an employee might use a personal Dropbox account to hit a deadline. If the internal project management tool lacks a specific feature, a team might migrate their workflow to an unmanaged Trello board. Shadow IT is often a symptom of “IT friction”—a gap between the tools provided by the company and the actual needs of the workforce.
The Hidden Dangers: Security and Compliance in the Shadows
While the intentions behind Shadow IT are often benign, the technical implications are severe. When “Jerry” lives in the basement without oversight, he creates vulnerabilities that can compromise the entire structure. From a digital security perspective, unmanaged technology is a primary vector for data breaches and regulatory non-compliance.
Data Leakage and the Lack of Visibility
The most significant risk of Shadow IT is the loss of data visibility. When data moves into an unsanctioned application, it moves outside the organization’s security perimeter. IT teams cannot protect what they cannot see. This leads to “data silos” where sensitive corporate information—ranging from customer PII (Personally Identifiable Information) to proprietary trade secrets—resides on servers that have not been vetted for security. If an employee leaves the company but retains access to a personal account containing corporate data, the organization has no way to revoke that access, creating a permanent security hole.
The Regulatory and Compliance Nightmare
For industries governed by strict data privacy laws like GDPR, HIPAA, or CCPA, Shadow IT is a ticking time bomb. These regulations require organizations to know exactly where their data is stored and how it is protected. An unauthorized “Jerry” app in the basement that stores patient records or European user data can result in multi-million dollar fines. Furthermore, these unmanaged tools often lack the necessary audit logs and encryption standards required for SOC2 or ISO 27001 certification, jeopardizing the company’s ability to partner with larger enterprise clients.

Financial Inefficiency and Redundant Tech
Beyond security, Shadow IT creates significant financial waste. Without centralized procurement, different departments often pay for separate subscriptions to the same service, missing out on volume discounts. Even worse, many of these “shadow” subscriptions continue to be billed long after the project has ended or the employee has moved on, leading to “zombie” software costs that drain the IT budget without providing any value.
Illuminating the Dark: Strategies for Managing Shadow IT
The solution to Shadow IT is not to launch a “witch hunt” or to lock down every system with draconian restrictions. Such measures often backfire, driving employees even further into the shadows. Instead, modern tech leadership must focus on visibility, integration, and education.
Implementing SaaS Management Platforms (SMPs)
To manage the “Jerrys” of the tech world, you must first find them. SaaS Management Platforms (SMPs) and Cloud Access Security Brokers (CASBs) act as the floodlights for the digital basement. These tools scan the network and financial records to identify every application being used across the organization. By analyzing traffic patterns and API connections, SMPs can provide a comprehensive inventory of the shadow landscape, allowing IT to see which apps are redundant and which pose the highest security risk.
Fostering a Culture of Collaborative IT
If Shadow IT is a response to friction, the best way to reduce it is to improve the internal user experience. IT departments must transition from being “the department of No” to “the department of How.” By creating a streamlined process for requesting and vetting new software, organizations can encourage employees to bring their favorite tools into the light. When the “path of least resistance” involves following official channels rather than bypassing them, the volume of Shadow IT naturally decreases.
Zero Trust and Identity-Centric Security
In a world where employees use dozens of different apps, the traditional “perimeter” security model is obsolete. Organizations should adopt a Zero Trust Architecture (ZTA). In this model, security is tied to the user’s identity rather than the network they are on. By utilizing Single Sign-On (SSO) and Multi-Factor Authentication (MFA) across all authorized apps, IT can ensure that even if a “shadow” app is used, the point of entry remains secure and monitored.
The Future of Decentralized Tech: Turning Shadows into Sunshine
As we move further into the decade, the nature of technology ownership is shifting. The “Jerry” in the basement is increasingly becoming an expert user who knows more about specific niche tools than the central IT team. This decentralization presents a unique opportunity for organizations that are willing to adapt.
Low-Code, No-Code, and the Citizen Developer
One of the biggest drivers of modern Shadow IT is the rise of low-code and no-code platforms. These tools allow non-technical employees to build their own automations and internal apps. While this can lead to unmanaged “sprawl,” it also represents a massive boost in organizational agility. Forward-thinking companies are embracing this trend by establishing “Centers of Excellence.” These are small, sanctioned groups that provide the governance and security frameworks within which “citizen developers” can build their own solutions without putting the company at risk.
AI and the New Frontier of Shadow Tech
The newest “Jerry” in the basement is Generative AI. Millions of employees are now using tools like ChatGPT or Claude to draft emails, write code, or analyze data. Much of this is happening “in the shadows,” with sensitive corporate data being fed into public AI models. The tech response should not be a blanket ban—which is virtually impossible to enforce—but rather the provision of sanctioned, enterprise-grade AI environments that offer the same productivity benefits with the added protection of data privacy and “opt-out” training policies.

Balancing Agility with Oversight
The goal of managing Shadow IT is not total elimination; it is controlled empowerment. A certain amount of “shadow” experimentation is actually healthy for a company; it is where innovation often begins. The key is to have a framework where these experiments can be identified, vetted, and eventually integrated into the official tech stack. By acknowledging “what we do in the shadows,” IT leaders can move from a state of constant firefighting to a state of strategic partnership.
In the end, the “Jerrys” of our digital infrastructure don’t have to be a threat. With the right technology trends, robust digital security protocols, and a focus on user experience, the basement can become a laboratory rather than a liability. By bringing Shadow IT into the light, organizations can ensure that their digital transformation is not just fast, but secure, compliant, and sustainable for the long term.
aViewFromTheCave is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com. Amazon, the Amazon logo, AmazonSupply, and the AmazonSupply logo are trademarks of Amazon.com, Inc. or its affiliates. As an Amazon Associate we earn affiliate commissions from qualifying purchases.