Pete explains the function of the cloud access security broker (CASB) in controlling Shadow IT.
- [Instructor] Now that you know a bit…about what shadow IT is, I'd like to talk…to you a bit about how we go about preventing shadow IT…and uncovering the shadow IT that already exists…in our organization.…It really starts by implementing an open door policy.…We have to recognize that shadow IT exists…and allow folks who've been working around…the IT department to get their work done,…to come forward and tell us what tools they're using.…And when we have that two-way non punitive communication…we can begin to understand where our gaps are…in the IT department that are causing people…to go around our processes in the first place.…
We want to learn how apps are being used…and what apps are being used.…And that's going to require you know, A,…some of that communication but B, some tools…to help us uncover to get some visibility…into how users are sending and receiving information…across the internet inside and outside our organization.…But at the end of the day we want to focus…on behavior, not apps.…Now certainly it's not a great idea that we have…
Share this video
Embed this video
Video: The tenets of shadow IT prevention