Back to Knowledge Base
GenGuard & Shadow IT 5 min read

Understanding Shadow IT Discovery

How Trustity detects unsanctioned SaaS applications without inspecting packet traffic.

How it Works

Unlike legacy CASB solutions that require complex proxy chaining or firewall log analysis, Trustity uses a Browser-Native approach.

The GenGuard agent monitors navigation events locally within the browser. When a user visits a new domain, the agent checks it against a local "Known SaaS" database.

Privacy First

Trustity does not record full URLs, query parameters, or page content for Shadow IT logs. Only the root domain (e.g., dropbox.com) and the timestamp are hashed and sent to the cloud for aggregation.

Risk Scoring

Applications are automatically categorized and scored based on:

  • Compliance Certifications: (SOC2, ISO27001)
  • Data Hosting Location: (GDPR compliance)
  • Encryption Standards: (TLS 1.3, AES-256)

Last updated: 12/5/2025

Was this helpful?