The security marketplace is buzzing about shadow IT — a phenomenon in which users enable public cloud applications without the consent or knowledge of the IT department. Many believe that such applications, ones leveraged by an organization’s employees, should be controlled.
We hate to say it, but the answer is “it depends”. Are such unsanctioned SaaS applications connected to your corporate environment? Are any connected to your other, sanctioned, cloud platforms like G Suite or Salesforce? When employees use their corporate credentials to enable the apps, you should pay attention. Those that aren’t pose less of a security concern, and we believe, should not keep you up at night.
What makes the most sense? Focusing on the applications that actually touch corporate resources of interest, the connected applications. Start by discovering all shadow applications operating in your environment, focusing on their access scopes - some will be riskier than other. Then make intelligent permission decisions to keep your users efficient, while cutting unnecessary risk.
Your browser version is outdated.
We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!
Click on the icon below to download the latest version of your browserClose