Article Details
Scrape Timestamp (UTC): 2024-05-03 10:45:45.511
Source: https://thehackernews.com/2024/05/new-guide-explains-how-to-eliminate.html
Original Article Text
Click to Toggle View
New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data. SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of technology and business. At the same time, these applications also pose a new security risk that security leaders need to address, since the existing security stack does not enable complete control or comprehensive monitoring of their usage. LayerX has recently released a new guide, "Let There Be Light: Eliminating the Risk of Shadow SaaS" for security and IT teams, which addresses this gap. The guide explains the challenges of shadow SaaS, i.e., the use of unauthorized SaaS apps for work purposes, and suggests practices and controls that can mitigate them. The guide also compares various security controls that attempt to address this risk (CASB, SASE, Secure Browser Extension) and explains how each one operates and its efficacy. Consequently, the guide is a must-read for all security leaders at modern organizations. Here are the main highlights: What's the Risk? According to LayerX, 65% of SaaS apps are not approved by IT and 80% of workers admit to using unapproved apps. This means that the majority of organizations are dealing with their corporate data being potentially exposed to external threats. The three main risks posed to organizations are: Shadow SaaS Mitigation Guidelines To address the risk of shadow SaaS, the guide introduces a three-pronged approach: App Discovery, User Monitoring, and Active Enforcement. Each aspect is dissected and explored, providing readers with a clear roadmap to effectively protect their systems and resources. As a part of this exploration, the guide compares two options for shadow SaaS mitigation: the traditional Proxy approach and the Browser-based solution. Each approach is broken down into pros and cons, equipping readers with the information they need to decide which path best suits their organizational needs. At a glance, here's what the comparison boils down to (you can read the complete analysis in the guide: Secure Browser Extensions Ultimately, Secure Browser Extensions emerge as the most comprehensive and user-friendly solution for combating shadow SaaS. These extensions empower IT and security teams to regain control of their SaaS environment, while providing visibility and governance of SaaS app use. This ensures a secure yet flexible workspace. Here's how secure browser extensions work: SaaS apps are easy to use and they benefit the organization's operations. Security and IT teams who aspire to be business enablers need to find ways to allow the use of SaaS apps, while ensuring protection of corporate environments. A secure browser extension is the solution that can provide both. To learn more, read the complete guide.
Daily Brief Summary
SaaS applications are increasingly prevalent in businesses, pushing technological and operational boundaries.
A new guide by LayerX, titled "Let There Be Light: Eliminating the Risk of Shadow SaaS," addresses the security risks associated with unauthorized SaaS app usage, commonly known as shadow SaaS.
Approximately 65% of SaaS apps are unapproved by IT departments, and 80% of employees admit to using such apps, creating significant data exposure risks.
The guide offers a three-pronged strategy for mitigating shadow SaaS risks including App Discovery, User Monitoring, and Active Enforcement.
It evaluates different security controls like CASB, SASE, and Secure Browser Extensions, providing detailed comparisons on their effectiveness.
Secure Browser Extensions are highlighted as particularly effective for controlling shadow SaaS by enhancing visibility and governance while maintaining user flexibility.
This guide is positioned as essential reading for security leaders aiming to secure their corporate environments without hindering operational flexibility.