It is becoming easier and more common for employees to download and use cloud-based applications for business purposes, called Bring your own apps (BYOA). These can include apps for cloud storage and sharing, collaboration, chat, search, and other functions. While many of them may be legitimate, they also represent a new source of phantom computingan attack surface unknown to IT and security.
Organizations need to understand not only which unauthorized apps are being used, but also “why” they are being used and what they can learn from the apps. For example, top performers are often early adopters of new technologies and will invariably seek out applications that bring them the most value, whether or not they have been approved by their organization. This type of innovation can benefit organizations if they understand the benefits.
Workforce Cyber Intelligence enables organizations to analyze app usage and device data to uncover unauthorized apps so they can take appropriate action. If a new application appears in an organization, it may be because existing applications do not meet the needs of employees. If successful teams are using the apps, you might consider formalizing and expanding their use. If apps violate your appropriate security or usage policies, you can stop using them.
DTEX IMPULSE is our Workforce Cyber Intelligence platform that provides organizations with metrics of employee engagement, including the tools and software they use, when they use them, how often, and the “intensity” of their use at over time. DTEX PULSE is platform independent when analyzing BYOA. In addition to Windows and macOS workstations, PULSE forwarders extend full monitoring support for Windows servers, Linux servers, and virtual environments such as Citrix and VDI.
In previous articles, we discussed two additional use cases for PULSE: remote workforce analysis and use of assets and software. Download the full DTEX PULSE e-book for more information and please contact us for a demo!
The post office Why Bring Your Own Applications is the new Shadow IT appeared first on DTEX Systems Inc..
*** This is a syndicated blog from the Security Bloggers Network of DTEX Systems Inc. written by Rajan Koo. Read the original post at: https://www.dtexsystems.com/blog/why-bring-your-own-applications-is-the-new-shadow-it/