With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs catch the traffic of users, identifying what needs attention in such comprehensive logs can be paralyzing for IT personnel. Shadow IT discovery enables organizations to narrow down the search to apps that should be more closely monitored ,controlled and in many cases – blocked. So what are some of the criteria to consider when choosing a cloud access security broker? Tune in to learn more.