With the prevalence and rapid adoption of cloud-based applications and services,
risks of shadow IT have become the main area of concern today. Shadow IT refers to
the use of
IT-related systems within an organization without the approval or even the knowledge
of the IT
or security department. It has grown exponentially in recent years as more employees
download
and use applications and services from the cloud to assist them in their work and
enhance
their productivity, for example, to access or share data quickly. Lack of control
over cloud
application access affects IT resources and costs, and risks corporate security and
compliance
as well.
In addition to the Web Reputation Services (WRS), Trend Micro provides the Cloud
service Reputation Service (CRS) that can identify cloud applications from website
domains to
categorize the cloud applications, assign a risk score to each cloud application,
and classify
cloud applications as different risks based on their risk scores. This makes access
to cloud
applications within your organization manageable to the IT or security department.
Integrated with the CRS service, TMWS allows the administrator to group a set of cloud applications based on
your corporate compliance and then add them in cloud access rules as necessary to
control the
access to these cloud applications on your network.