Capture Threat Assessment User Guide
- Capture Threat Assessment
- Overview
- Generating CTA Reports
Shadow IT
Shadow IT, also called SaaS Application Services, are dominating most client networks. SaaS (Software as a Service) is one of three main categories of cloud computing, along with Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). Security policies are required for visibility into these applications to avoid incurring legal liabilities on your organization.
In the CTA 2.2 release, the Shadow IT application is only available for firewalls that have been added to CSC-MA (Capture Security Center-Management). Additionally, the Analytics license is required for CSC-MA to get in-depth analysis of Shadow IT applications. Refer to Getting Started with Capture Security Center for information on CSC-MA licensing.
If no data is available, the page displays a message saying so. You may need to have Analytics licensing enabled to capture the Shadow IT data in this report. Next steps are identified for you to follow as in the following example:
Was This Article Helpful?
Help us to improve our support portal