У нас вы можете посмотреть бесплатно Mac Admins vs Shadow IT: Detecting Unauthorized Apps and SaaS Tools или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Combat shadow IT without alienating users. Todd Clark (Manager of IT Operations at Get Well) shares practical strategies for detecting unauthorized software, monitoring Homebrew installations, tracking OAuth SaaS signups, managing BYOD risks, and preparing for shadow AI. Learn how to use Jamf Pro extension attributes, smart groups, and third-party tools like Polypane to surface hidden compliance gaps, from browser extensions to personal devices accessing corporate data. What you'll learn: ► Defining shadow IT in Mac environments (Homebrew, OAuth SaaS, BYOD) ► Using Jamf Pro extension attributes to track unauthorized software ► Monitoring Homebrew cask installations with smart groups ► Detecting OAuth SaaS signups with Polypane and Google Workspace ► Managing BYOD risks without disrupting user privacy ► Browser monitoring: Chrome profile data, extensions, and personal accounts ► Identifying shadow AI tools (ChatGPT, Claude, Gemini browser usage) ► Building remediation policies that educate vs punish users ► Cross-referencing device inventory with approved software lists ► Balancing security compliance with user productivity 0:05 Introduction: Mac Admins vs Shadow IT 3:18 Defining Shadow IT: Beyond Unauthorized Software 6:56 Why Shadow IT Matters: Security, Compliance, Operational Risk 8:00 Shadow IT in Mac Environments: Homebrew, OAuth SaaS, BYOD 10:33 Visibility with Jamf Pro: Extension Attributes as Your Glasses 12:03 Tracking Homebrew: Version, Casks, and Cross-Referencing with Polypane 13:11 Remediation: Education, Policies, and Restricted Software 14:44 BYOD Challenges: Personal Devices as Hidden Shadow IT 17:18 Get Well's BYOD Journey: Google MDM, Jamf Pro, and Account-Driven Enrollment 22:27 Third-Party Tools: Polypane for OAuth and SaaS Monitoring 28:28 Shadow AI: The New Frontier of Unauthorized Tools 32:10 Takeaways: Diligence, BYOD Strategy, Browser Management, and Shadow AI Preparedness Who this video is for: ► Mac administrators managing shadow IT risks ► IT security teams enforcing software compliance ► InfoSec professionals tracking unauthorized SaaS tools ► Compliance officers managing SOC 2, HIPAA, FedRAMP audits ► IT operations managers balancing user productivity with security #shadowit #compliance #macadmin #ITsecurity #unauthorized software #byod #jamf