![]() ![]() Once this is done, there is a catalog of over 16,000 cloud applications that can be checked for and analyzed. For the purpose of this demo, the data came from a fictitious Sonicwall environment used for Microsoft demos and testing.Ī day’s worth of logs for a medium to large business can be parsed in a few hours. ![]() There is also a custom log format tool in the application that allows you to set up CAS for any logs you may have. Now you have a Shadow IT problem Using your firewall logs to identify Shadow ITĬloud App Security (CAS) can import system logs from over 20 different flavors of Firewalls, including Sonicwall, Sysco, Palo Alto Networks, Watch Guard and many more.
0 Comments
Leave a Reply. |