How to identify the applications used in your company

François Poulet

|

Product Manager at Youzer

12/2019

Articles
>
ITSM automation
Youzer offers you a simple and concrete way to identify the applications used in your company.

Contents

First of all, why list applications?

Even if the answer is obvious, it begs the question: what's the point of listing the IT resources used by my users? And how can I do it with Youzer?

Safety issues are obviously at the heart of this need for a census.

If we don't even know that certain systems exist, this data is out of our hands.

A manager who creates a Pipedrive account to improve his team's sales performance has no idea of the "data" implications of this application. He or she is rarely aware that the data he or she publishes in this system belongs to his or her company, and must be treated with the necessary confidentiality.

For example, if a member of the sales team leaves the company, the manager - focused on recruiting the replacement - will not think of closing the account of the departed user.

If this user goes to the competition, all the prospecting data ends up in the wrong hands.

Envie de voir une démo instantanée de Youzer ?  
View demo

Methods for detecting off-radar applications

To reference the applications used, the first step is to register them in a single repository. In this way, the information collected can be added as and when required.

Initially, saving these resources requires only memory.

Then it's the users who need to be approached: every department in the company will generally cooperate in building the repository, by manually indicating which applications are in use.

Finally, you need to pay close attention to any information about new applications: it's often at a steering committee or management meeting that you learn that a particular system has been implemented in a team.

Finally, to complete this list, it may be useful to look at the list of recurring payments: new SaaS applications can be easily identified in this way.

Would you like to receive our white paper on identity and access management?

Thank you, we have received your request and you will receive the book shortly.
Oops! a field has been filled in incorrectly 😖

So what's the point?

In concrete terms, this means getting to know your IS in the broadest sense of the term: not only the legacy, but also the shadow it, which should not be considered as an enemy, but as a parameter to be taken into account.

This is the best way to protect company data.

With Youzer, you can list on an extranet all the resources used by the employee and external service providers.

Récap'IT the IT Newsletter

Get the best of the month's IT news.
Market developments, IT trends, cyberattacks in France... a digest of the month's IT news.

We have been unable to confirm your registration.
Your registration is confirmed! You'll receive your next Récap'IT at the end of the month 😊

Recommended items

Discover Youzer, the first
platform for easy management of your users and their access.

Hey! you know the drill :) We use anonymous data analysis cookies. By "Accept all cookies", you help us understand (anonymous) page views. Learn more about our privacy policy.