In this demo, it’s all about shadow IT – how can these unknown systems and applications be reliably identified? The answer: Automated shadow IT detection with Kertos.
The live demonstration shows how companies can uncover hidden risks and optimize their IT security. As a practical example, a website scan of spiegel.de will be conducted to illustrate how it works in real-time.