A cloud administrator is tasked with implementing a security solution to discover and control the use of unapproved SaaS applications by employees, a phenomenon known as 'Shadow IT'. The solution must provide visibility into cloud application usage, enforce data security policies, and protect against cloud-based threats. Which of the following cloud security controls is BEST suited for this purpose?