Microsoft Cybersecurity Stack: Shutting Down Shadow IT

Microsoft Cybersecurity Stack: Shutting Down Shadow IT

Downloadable Video - 2019
Rate this:
Get shadow IT under control in your organization. Learn about the risks posed by shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.
Shadow IT is the use of systems and services-such as Dropbox and AWS-that are managed without the knowledge of a company's IT department. As a majority of modern enterprises grapple with the risks posed by shadow IT, IT pros need to grasp how to mitigate these threats. In this installment of the Microsoft Cybersecurity Stack series, Pete Zerger provides end-to-end coverage of shadow IT, from the risks it poses to how to identify and eliminate threats with tools in the Microsoft cybersecurity stack. Discover how to leverage Cloud App Security (CAS), as well as how to anonymize user identity information. Plus, learn how to leverage the Microsoft Data Classification Service and CAS file policies to protect confidential information, how to control access to unmanaged devices, and more.
Publisher: Carpenteria, CA, lynda.com,, 2019
Characteristics: 1 online resource
Additional Contributors: lynda.com (Firm)

Related Resources


Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age Suitability

Add Age Suitability

There are no age suitabilities for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Recommendations

Subject Headings

  Loading...

Find it at VIRL

  Loading...
[]
[]
To Top