Proof of Concept in order to identify applications not controlled by your IT department
Vorstone will provide several phases in this offer :
For Shadow IT Discovery, we use the capabilities of Microsoft Defender for Cloud Apps, which have been expanded to also allow monitoring of Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) resources in Azure. Combined with the power of unique capabilities within the Azure Microsoft cloud, we will carefully evaluate your firewall logs to discover exactly what cloud-based applications are being used.
We will then present the information back to you at a high-level. We will engage with you to mitigate the use of these apps and services within Azure and educate scoped users on how to use sanctioned apps and services.
Finally, we will provide you packages to automatically remediate risks and compromised users, and manage alerts
Discover which cloud apps people are using.