Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
Downloadable Video, 2019
Current format, Downloadable Video, 2019, , Available.
Downloadable Video, 2019
Current format, Downloadable Video, 2019, , Available. Offered in 0 more formats
Get shadow IT under control in your organization. Learn about the risks posed by shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack. Shadow IT is the use of systems and services-such as Dropbox and AWS-that are managed without the knowledge of a company's IT department. As a majority of modern enterprises grapple with the risks posed by shadow IT, IT pros need to grasp how to mitigate these threats. In this installment of the Microsoft Cybersecurity Stack series, Pete Zerger provides end-to-end coverage of shadow IT, from the risks it poses to how to identify and eliminate threats with tools in the Microsoft cybersecurity stack. Discover how to leverage Cloud App Security (CAS), as well as how to anonymize user identity information. Plus, learn how to leverage the Microsoft Data Classification Service and CAS file policies to protect confidential information, how to control access to unmanaged devices, and more.
From the community