This 3-day implementation will leverage the skilled personnel, firewall log scanners and project management expertise to evaluate your overall risk of Shadow IT.
For Shadow IT Discovery, we use the capabilities of Microsoft Cloud App Security, which have been expanded to also allow monitoring of Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) resources in Azure.
Combined with the power of unique capabilities within the Azure Microsoft cloud, we will carefully evaluate your firewall logs to discover exactly what cloud-based applications are being used. We will then present this information back to you at a high-level. We will engage with your users and organization to mitigate the use of these apps and services within Azure and educate users on how to use sanctioned apps and services.
Description of Activities
Discover which cloud apps people are using.
Review concepts of Shadow IT:
Technical Set Up:
Log upload and analysis followed by onsite workshop. Review output including but not limited to;
Recommendations for next steps for automated discovery & app connectors.