Video Transcript

Welcome to a new episode of Glass Class. In this video, I'm going to be talking to you about why Shadow IT should not be your first step towards your security strategy.

Traditionally, security vendors have recommended customers to go ahead and perform Shadow IT discovery. What vendors do or what customers do is basically, upload their firewall logs to a security vendor and identify the plethora of apps that are being used by their corporate users. Once they identify these apps, they go ahead and try to identify and secure the major SaaS apps that are being used. This is the place where majority of the corporate data resides.

Once they are done with securing this, they go ahead and click on the long tail of SaaS apps. Let's take the analogy of a boat. Let's take it a step further and assume the boat is sinking, with large holes of varied sizes. As a person who needs to keep the boat afloat, the first step you would do is to identify these large holes where water is gushing in and then try to plug them out. Once you are done with that, you assess the overall condition of the boat and then plug those small holes out.

We take the same strategy and recommend that customers take the same approach towards security, as well. So the first step that customers should do is to secure the major SaaS apps which are being sanctioned for corporate usage, plug them in and provide security control and visibility into these apps. This could be from Office 365, Box, Dropbox, or a G Suite.

Once you are done with that, you can perform a Shadow IT discovery, with the help of uploading your firewall logs to customers, to a security vendor, or also uploading or setting up a CIS log forwarder. Once you are done with this, you can go ahead and secure these long tail of SaaS apps.

Thank you for watching Glass Class.