Discovering Shadow IT
Last updated
Last updated
Discover Corma’s Shadow IT functionality, designed to map unauthorised app usage across your teams and empower you to take proactive steps to mitigate security and compliance risks.
Access the Shadow IT Applications page by clicking the dedicated block in the Overview page or by navigating through the Applications page in the left-hand menu.
The dedicated Shadow IT Apps page displays all Shadow IT applications detected by Corma in a comprehensive table, providing the following details for each application:
The number of users using the app.
The app status: Unauthorized, Authorized, Tolerated, or To Review.
The sources of data collection: SSO, Browser Extension, or Direct Integration.
The number of open requests for the app.
The compliance risk level: Low, Moderate, or High.
Clicking the three dots in the last column opens a dropdown menu, providing quick access to several shortcut actions, as shown below with the application "June" as an example. These options allow admins to:
See the app in its dedicated page
Modify the app settings
Be redirected to the app
Delete the app