Go back

How to Manage Shadow IT in your Cloud Office

Whether remote or in-person, your company works in the cloud. Collaboration tools like Google Workspace and Office 365 have become the de facto cloud office. Keeping the office secure without impacting productivity has always been top of mind for Security and IT teams – in the cloud, it takes a different shape that requires a fresh perspective on protection.

Engineering
October 12, 2023
8m read
8m read
8m listen
8m watch
8m watch
circles in a blue background
speakers
speakers
speakers
authors
Tina Jiang
participants
No items found.
share

Whether remote or in-person, your company works in the cloud. Collaboration tools like Google Workspace and Office 365 have become the de facto cloud office. Keeping the office secure without impacting productivity has always been top of mind for Security and IT teams – in the cloud, it takes a different shape that requires a fresh perspective on protection.

Connected to your cloud office is the suite of apps that teams and individuals need to do their jobs effectively. The vast catalog of available tools gives a lot of choice, but also a lot of consideration. While self-serve is tempting, the goal is to formalize a procurement process that allows for a careful review of policies & procedures.

If only it were that simple – getting the entire company to adhere to your policies is a constant battle, leading to a slew of unsanctioned signups that pose a significant risk.

In this blog, we’ll uncover what lurks in the shadows, helping you gain the right amount of visibility to get a better handle of all downstream app accounts.

What is Shadow IT?

Shadow IT is defined as any system or application that is deployed at an organization but unsanctioned by the security or IT team. These teams don’t have central control over these applications and cannot typically monitor them to ensure responsible use.

According to a recent report, approximately 20% of IT assets are invisible to security teams. Without visibility and control over these applications, organizations leave themselves open to security risks.

So how can your security team take control over Shadow IT risks? We’ll walk through three core steps to managing Shadow IT at your organization and how Material Security can help.

Step 1: Gaining Visibility into Shadow IT

The first step to managing Shadow IT is to discover which apps are being used across the organization.

At Material Security, our API connection to the inbox enables us to monitor mail for password reset messages, account activations, and account verification messages.  This allows us to infer which apps employees are using.

These detected apps are surfaced in the Material Security console with information on app category, associated accounts, data breaches, and more.

apps content image

Step 2: Understanding Security Gaps

For each app Material detects, we’re able to understand Shadow IT risks like unprotected password resets through weak or nonexistent MFA and risky OAuth scopes.

Important context like the MFA status and exact scopes an app has access to are displayed per app to enable quick and thorough investigations.

dashboard content image

Step 3: Remediating Shadow IT

With an understanding of which apps are being used across the company and what security risks those apps present, companies can determine their Shadow IT policy per app and remediate unsanctioned app usage. Here are some sample remediations Material Security offers to our customers:

MFA layering for non-Federated Apps

For any app in the shadows with weak or missing MFA, Security and IT teams can choose to protect those apps with Material’s Identity Protection product. Material Identity Protection continuously finds SSO gaps, acting as MFA for non-federated apps.

Material identifies signup confirmations, password resets, and other account verification messages from hundreds of third-party apps and intercepts those messages with an authentication “challenge”. Once the user verifies their identity, Material delivers the original account access message. This protects a user’s corporate identity by preventing misuse and lateral account takeover.

email content image

Blocking Shadow IT

For organizations that take a hardline approach to their Shadow IT policy, Material can block unsanctioned apps. Within Material, admins choose apps to block, and employees will be unable to access account related messages from those apps, preventing them from using it. Instead, they will see a message that the app has been blocked with customized instructions.

gmail opened content image

With the visibility and context Material provides, IT is no longer in the shadows. Organizations have access to effective remediations that automate Shadow IT remediation by blocking or warning on unauthorized app usage and protecting non federated apps that are used by the organization. Reach out to learn more.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

Patrick Duffy
4
m read
Read post
Podcast

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m listen
Listen to episode
Video

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m watch
Watch video
Downloads

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m listen
Watch video
Webinar

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m listen
Listen episode
blog post

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

Josh Donelson
5
m read
Read post
Podcast

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Listen to episode
Video

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m watch
Watch video
Downloads

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Watch video
Webinar

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Listen episode
blog post

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Material Team
10
m read
Read post
Podcast

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Listen to episode
Video

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m watch
Watch video
Downloads

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Watch video
Webinar

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Listen episode
blog post

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Material Team
35
m read
Read post
Podcast

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Listen to episode
Video

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m watch
Watch video
Downloads

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Watch video
Webinar

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.