Shadow IT Radar doesn’t just detect tools—it helps you govern them. By combining automated AI-driven risk scoring with real-time usage metrics, it enables you to shift from reactive discovery to proactive compliance management.


Sastrify’s Shadow IT Radar empowers IT and compliance teams to detect, assess, and manage both authorized and potentially unauthorized applications. Leveraging your Identity Provider (IdP) connection as the foundational data source—enhanced by insights from the browser extension—it identifies applications in use and potential shadow assets, assigns dynamic risk scores, and delivers clear, actionable next steps.


With full visibility and guided actions such as approving, sanctioning, or contacting users, you can reduce compliance risks, strengthen security, and streamline operations across your organization.


IN THIS ARTICLE


Prerequisites for Shadow IT Radar


To ensure the Shadow IT Radar is populated with accurate data, the Identity Provider (IdP) must be active. This is your Single Source of Truth. IdP provides visibility into all applications accessed and managed via your company IdP.


As a powerful complementary component, Browser Extension—deployed via admin or manual installation—capture usage metrics from company-managed browser profiles, providing deeper insights into software activity.


The Four Building Blocks of Radar



Navigate to Risk Monitoring > Shadow IT Radar to access the four tabs that support your asset evaluation process:

  • Overview: Track all discovered assets, filter by risk score or source, take actions such as approval or sanction, and summarize asset findings and user monitoring by risk and monitoring status.

  • Sanctioned: View sanctioned tools and send reminders to identities/users to ensure compliance.

  • Identities: See a breakdown of identities from your IdP, including the assets they use, a summary of monitored vs. unmonitored employees, and how many are using shadow or sanctioned tools.

  • Ignored: Not every discovery requires action. In addition to approving or sanctioning tools, you can mark irrelevant assets as ignored.


Overview Tab: The Discovery Zone



The Overview tab is your starting point for every newly detected asset. Here, Sastrify’s matching algorithm automatically cross-references and matched discoveries against an extensive product catalog to ensure accurate naming and mapping.


Manual Matching: Any unmatched assets can be manually matched to certain products using the fields on each line item. Matched assets can also be re-matched to new products, giving you full control over shadow IT discoveries.


You can take actions directly from this page:

  • Approve: Moves the matched assets as products to Inventory > Suppliers & Products.

  • Sanction: Moves the assets to the Sanctioned tab.

  • Ignore: Moves the assets to the Ignored tab.


Pro Tip: Actions can be performed individually or in bulk by selecting multiple assets and clicking the corresponding button in the lower-right corner of the page.


The page shows how many identities are active versus inactive over the last 30 days. Users are flagged as "Active" if they meet one of these thresholds in a 30-day period:

  • At least 20 clicks

  • At least 15 keystrokes

  • Any file upload activity

  • A session duration of more than 3 minutes


User activity metrics (e.g., clicks, keystrokes, and file uploads) track only the frequency or occurrence of these actions—they do not capture the actual keys pressed or the contents of uploaded files.


Shadow IT Radar goes further than detectionour AI automatically gathers publicly available data to provide a baseline security posture for thousands of SaaS publishers and products. For more detailed risk score evaluation criteria, click here.


Sanctioned Tab: The Compliance Zone



This tab houses assets that have been officially sanctioned for company use.

  • Notify Identities: Click "Notify Identities" to send an automated email reminder to employees, instructing them to discontinue use of a specific tool.

  • Re-Evaluate: If a sanctioned tool is later cleared for use, you can Approve it directly from here to move it to your Inventory.


When the "Notify Identities" button is clicked, the Sastrify admin can send an email notification to the identities using the sanctioned tool.



Identities Tab: The Accountability Zone



The Identities tab shifts the focus from software to people. It provides a deep dive into the human element of your SaaS risk, mapping identities from your IdP to the specific tools they are using.

  • Identity Breakdown: See exactly which assets are associated with specific identities.

  • Direct Contact: Use the notification feature to send email reminders to employees, instructing them to follow compliance steps or discontinue use of specific assets.


The page shows how many identities are active versus inactive over the past 30 days, based on the following usage thresholds: ≥20 clicks, ≥15 keystrokes, any file upload, or session longer than 3 minutes. User activity metrics track only the frequency or occurrence of these actions—they do not capture the actual keys pressed or the contents of uploaded files.


Ignored Tab: The Maintenance Zone


Not every discovery is a threat. Use this tab to store "noise" or irrelevant items that don't require action but should be kept out of your main Overview.

  • Clean Workspace: Keep your Overview tab focused on actionable items.

  • Restore: If an ignored tool suddenly becomes relevant, you can move it back to Approve or Sanction at any time