Detecting Shadow IT

Detect all applications used by employees

elba discovers third-party applications through multiple automated methods:

Discovery methods

  • Token discovery: scans for OAuth tokens across your connected platforms
  • Email scanning: detects applications through analysis of email activity and communication patterns
  • Source connection scanning: directly connects with over 100 applications via API

Application analysis

Once an application is discovered, elba automatically:

  • Collects metadata: Gathers application permissions, scopes, and usage information
  • Maps user access: Tracks which users in your organisation have accounts with each application
  • Monitors SSO Adoption: Identifies whether applications are accessed through single sign-on or direct login
  • Refines publisher Information: Collects publisher details and verification status

AI-Powered risk scoring

elba then uses AI analysis to evaluate each application's risk level based on:

  • Requested permissions and data access scopes
  • Security certifications and compliance status (HIPAA, GDPR, PCI DSS, NIST)
  • Historical security incidents and data breaches
  • DNS Reputation & publication status
  • CVE (Common Vulnerabilities and Exposures) tracking