Discovering Shadow IT

Discover Corma’s Shadow IT functionality, designed to map unauthorised app usage across your teams and empower you to take proactive steps to mitigate security and compliance risks.

Access the Shadow IT Applications page by clicking the dedicated block in the Overview page or by navigating through the Applications page in the left-hand menu.

The dedicated Shadow IT Apps page displays all Shadow IT applications detected by Corma in a comprehensive table, providing the following details for each application:

  • The number of users using the app.

  • The app status: Unauthorized, Authorized, Tolerated, or To Review.

  • The sources of data collection: SSO, Browser Extension, or Direct Integration.

  • The number of open requests for the app.

  • The compliance risk level: Low, Moderate, or High.

Clicking the three dots in the last column opens a dropdown menu, providing quick access to several shortcut actions, as shown below with the application "June" as an example. These options allow admins to:

  • See the app in its dedicated page

  • Modify the app settings

  • Be redirected to the app

  • Delete the app

Last updated