Go back

How to Manage Shadow IT in your Cloud Office

Whether remote or in-person, your company works in the cloud. Collaboration tools like Google Workspace and Office 365 have become the de facto cloud office. Keeping the office secure without impacting productivity has always been top of mind for Security and IT teams – in the cloud, it takes a different shape that requires a fresh perspective on protection.

Engineering
October 12, 2023
8m read
8m read
8m listen
8m watch
8m watch
circles in a blue background
speakers
speakers
speakers
authors
Tina Jiang
participants
No items found.
share

Whether remote or in-person, your company works in the cloud. Collaboration tools like Google Workspace and Office 365 have become the de facto cloud office. Keeping the office secure without impacting productivity has always been top of mind for Security and IT teams – in the cloud, it takes a different shape that requires a fresh perspective on protection.

Connected to your cloud office is the suite of apps that teams and individuals need to do their jobs effectively. The vast catalog of available tools gives a lot of choice, but also a lot of consideration. While self-serve is tempting, the goal is to formalize a procurement process that allows for a careful review of policies & procedures.

If only it were that simple – getting the entire company to adhere to your policies is a constant battle, leading to a slew of unsanctioned signups that pose a significant risk.

In this blog, we’ll uncover what lurks in the shadows, helping you gain the right amount of visibility to get a better handle of all downstream app accounts.

What is Shadow IT?

Shadow IT is defined as any system or application that is deployed at an organization but unsanctioned by the security or IT team. These teams don’t have central control over these applications and cannot typically monitor them to ensure responsible use.

According to a recent report, approximately 20% of IT assets are invisible to security teams. Without visibility and control over these applications, organizations leave themselves open to security risks.

So how can your security team take control over Shadow IT risks? We’ll walk through three core steps to managing Shadow IT at your organization and how Material Security can help.

Step 1: Gaining Visibility into Shadow IT

The first step to managing Shadow IT is to discover which apps are being used across the organization.

At Material Security, our API connection to the inbox enables us to monitor mail for password reset messages, account activations, and account verification messages.  This allows us to infer which apps employees are using.

These detected apps are surfaced in the Material Security console with information on app category, associated accounts, data breaches, and more.

apps content image

Step 2: Understanding Security Gaps

For each app Material detects, we’re able to understand Shadow IT risks like unprotected password resets through weak or nonexistent MFA and risky OAuth scopes.

Important context like the MFA status and exact scopes an app has access to are displayed per app to enable quick and thorough investigations.

dashboard content image

Step 3: Remediating Shadow IT

With an understanding of which apps are being used across the company and what security risks those apps present, companies can determine their Shadow IT policy per app and remediate unsanctioned app usage. Here are some sample remediations Material Security offers to our customers:

MFA layering for non-Federated Apps

For any app in the shadows with weak or missing MFA, Security and IT teams can choose to protect those apps with Material’s Identity Protection product. Material Identity Protection continuously finds SSO gaps, acting as MFA for non-federated apps.

Material identifies signup confirmations, password resets, and other account verification messages from hundreds of third-party apps and intercepts those messages with an authentication “challenge”. Once the user verifies their identity, Material delivers the original account access message. This protects a user’s corporate identity by preventing misuse and lateral account takeover.

email content image

Blocking Shadow IT

For organizations that take a hardline approach to their Shadow IT policy, Material can block unsanctioned apps. Within Material, admins choose apps to block, and employees will be unable to access account related messages from those apps, preventing them from using it. Instead, they will see a message that the app has been blocked with customized instructions.

gmail opened content image

With the visibility and context Material provides, IT is no longer in the shadows. Organizations have access to effective remediations that automate Shadow IT remediation by blocking or warning on unauthorized app usage and protecting non federated apps that are used by the organization. Reach out to learn more.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

Material Team
2
m read
Read post
Podcast

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

2
m listen
Listen to episode
Video

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

2
m watch
Watch video
Downloads

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

2
m listen
Watch video
Webinar

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

2
m listen
Listen episode
blog post

CISO Series Interview with David Spark

“Sky’s the limit with how you can transform your email”

Material Team
4
m read
Read post
Podcast

CISO Series Interview with David Spark

“Sky’s the limit with how you can transform your email”

Chris Long
4
m listen
Listen to episode
Video

CISO Series Interview with David Spark

“Sky’s the limit with how you can transform your email”

Chris Long
4
m watch
Watch video
Downloads

CISO Series Interview with David Spark

“Sky’s the limit with how you can transform your email”

Chris Long
4
m listen
Watch video
Webinar

CISO Series Interview with David Spark

“Sky’s the limit with how you can transform your email”

Chris Long
4
m listen
Listen episode
blog post

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

45
m read
Read post
Podcast

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

Max Pollard
45
m listen
Listen to episode
Video

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

Max Pollard
45
m watch
Watch video
Downloads

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

Max Pollard
45
m listen
Watch video
Webinar

TLDR Sec Demo Video Deep Dive with Clint Gibler

Watch a deep dive Material demo with Clint Gibler from TLDR Sec.

Max Pollard
45
m listen
Listen episode
blog post

New in Material: Enhanced Structured Email Search for More Powerful & Precise Results

We're thrilled to announce a significant upgrade to our email search functionality featuring a more powerful query experience and faster results.

Logan Carmody
3
m read
Read post
Podcast

New in Material: Enhanced Structured Email Search for More Powerful & Precise Results

We're thrilled to announce a significant upgrade to our email search functionality featuring a more powerful query experience and faster results.

3
m listen
Listen to episode
Video

New in Material: Enhanced Structured Email Search for More Powerful & Precise Results

We're thrilled to announce a significant upgrade to our email search functionality featuring a more powerful query experience and faster results.

3
m watch
Watch video
Downloads

New in Material: Enhanced Structured Email Search for More Powerful & Precise Results

We're thrilled to announce a significant upgrade to our email search functionality featuring a more powerful query experience and faster results.

3
m listen
Watch video
Webinar

New in Material: Enhanced Structured Email Search for More Powerful & Precise Results

We're thrilled to announce a significant upgrade to our email search functionality featuring a more powerful query experience and faster results.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.