Shadow IT challenges
Cloud usage continues to expand as end users and departments become more comfortable acquiring cloud services. The typical organization is only aware of a small fraction of its overall cloud activity. The lack of a coordinated cloud enablement strategy leads to a broad set of productivity, expense, security, and support issues.
You need full visibility and risk information to manage cloud adoption in a secure and organized fashion. Once decisions are made about specific apps, you need the ability to block access to applications that are not approved to reduce the risk of sensitive data loss, account compromises, and malware infections.
Three key requirements
Dashboard for visibility and trends
The dashboard shows the level of cloud service activity and risk in your organization. It also provides a summary by app category that is sorted by risk level. This gives insight into potential policy and compliance violations if employees use a new cloud service instead of an approved app.
Preset application-level reports provide a list of apps with each label: Unreviewed, Under Audit, Approved, and Not Approved. Easily apply filters to create custom views that help you understand and track use by category, usage, type, or status.
Utilize the 30 application categories to organize the apps in use and filter by risk level or number of requests to understand your current exposure. Then make informed decisions about categories and assign the individual apps to the Approved, Under Audit, or Not Approved groups.
Easily block the available apps by clicking on the link in the application listing or detail pages. Enforce this control for any network, group, or individual user accessible by Umbrella policies.
Umbrella App Discovery and Blocking
Gain visibility of cloud services in use and block risky apps to improve security.
Cisco Umbrella + Cloudlock
Learn how Cisco Umbrella and Cloudlock can enable visibility and protection for your cloud-connected organization.