Enterprises making progress
Other IT leaders were less convinced of WalkMe’s numbers. Hundreds of unauthorized apps would not have been surprising a decade ago, but since then, CIOs have become more strategically engaged with business leaders in their organizations, says Bill Hineline, field CTO at Chronosphere, provider of a cloud observability platform.
But the use of unauthorized apps remains a problem for many organizations, he adds. “Ghost IT, frustration with IT systems, and unauthorized apps are generally tightly interconnected in my experience,” he says. “You start with user frustration that stems from either support problems, reliability issues, or functionality gaps unaddressed by the technology organization.”
When these issues exist, business teams often source their own IT solutions, Hineline says. “It rarely ends well for either the business team, the ghost IT team, or the central technology organization,” he adds.