Datasheets

ESG-Solution-Showcase-Cisco-Nov-2017-Final

Issue link: https://learn-umbrella.cisco.com/i/921656

Contents of this Issue

Navigation

Page 0 of 4

This ESG Solution Showcase was commissioned by Cisco and is distributed under license from ESG. © 2017 by The Enterprise Strategy Group, Inc. All Rights Reserved. The Dimensions of Shadow IT The broader dynamic of shadow IT is not a new one. The consumerization of IT started with the personal computer and has expanded dramatically with the use of smartphones and tablets. More recently, end-users have become very comfortable adopting SaaS apps to assist them with their jobs and boost productivity. As a result, many large companies have hundreds of shadow IT SaaS apps in use within their environments. Although empowering departments and individuals to quickly adopt new apps can be beneficial, there are legitimate concerns about data security, malicious apps, and account compromise as well as cost and functionality overlap. While this type of activity can't and shouldn't be halted, there is an urgent need for better visibility to help promote, manage, and optimize healthy and efficient cloud adoption. Visibility Gap – Shadow IT Cloud Apps and Their Associated Data The "visibility" and "control" constructs of many, if not most, cybersecurity disciplines also applies to securing the use of cloud apps and starts with the adage that "you cannot secure what you cannot see." When it comes to shadow IT cloud apps, organizations know very well the unauthorized use of cloud apps has run rampant. In fact, nearly two-thirds of organizations participating in research conducted by ESG indicated that they are aware of a significant or moderate amount of non-IT-sanctioned cloud applications in use in their organizations. Establishing cloud app usage policies has little effect on the prevalence of shadow IT apps, with 77% of participants who stated that they have a significant or moderate amount of non-IT-sanctioned cloud applications in use in their organization also indicating that they have a formal methodology they always follow for each sanctioned IT app. So, what's the issue? Securely Enabling the Use of Cloud Apps with Cisco Cloudlock Date: November 2017 Author: Doug Cahill, ESG Senior Analyst Abstract: While cloud applications have enabled new business opportunities, and streamlined workflows such as those required for external collaboration, their widespread unauthorized adoption has created a set of security and compliance challenges. Addressing those concerns requires a pragmatic approach, one that enables the secure use of cloud apps. Cloud access security brokers (CASBs), which provide insight into the risk associated with cloud apps and usage patterns as the basis for defining and applying policy, can provide the visibility and control required to implement such an approach. Cisco Cloudlock allows organizations to not only gain visibility into what cloud applications are being used, but also understand their associated risk to implement policies that protect data assets stored with these apps from compromise. Establishing cloud app usage policies has little effect on the prevalence of shadow IT apps… Solution Showcase Enterprise Strategy Group | Getting to the bigger truth.™

Articles in this issue

view archives of Datasheets - ESG-Solution-Showcase-Cisco-Nov-2017-Final