Why Bring Your Own Applications is the new Shadow IT

It is becoming easier and more common for employees to download and use cloud-based applications for business purposes, called Bring Your Own Applications (BYOA). These can include apps for cloud storage and sharing, collaboration, chat, search, and other functions. While many may be legitimate, they also represent a new source of shadow IT, an unknown attack surface in IT and security.

Organizations need to understand not only which unauthorized apps are being used, but also “why” they are being used and what they can learn from the apps. For example, top performers are often early adopters of new technologies and will invariably seek out applications that bring them the most value, whether or not they have been approved by their organization. This type of innovation can benefit organizations if they understand the benefits.

Workforce Cyber ​​Intelligence enables organizations to analyze app usage and device data to uncover unauthorized apps so they can take appropriate action. If a new application appears in an organization, it may be because existing applications do not meet the needs of employees. If successful teams are using the apps, you might consider formalizing and expanding their use. If apps violate your appropriate security or usage policies, you can stop using them.

DTEX PULSE is our Workforce Cyber ​​Intelligence platform that provides organizations with metrics of employee engagement, including the tools and software they use, when they use them, how often and “intensity” of their use over time. DTEX PULSE is platform independent when analyzing BYOA. In addition to Windows and macOS workstations, PULSE forwarders extend full monitoring support for Windows servers, Linux servers, and virtual environments such as Citrix and VDI.

In previous articles, we discussed two other use cases for PULSE: remote workforce analytics and asset and software utilization. Download the full DTEX PULSE e-book for more information and contact us for a demo!

The post Why Bring Your Own Applications is the new Shadow IT appeared first on DTEX Systems Inc.

*** This is a syndicated blog from DTEX Systems Inc’s Security Bloggers Network written by Rajan Koo. Read the original post at: https://www.dtexsystems.com/blog/why-bring-your-own-applications-is-the-new-shadow-it/

Comments are closed.