OUR STRATEGY AND BLUEPRINT - Data

 

Cloud Access Security Broker

  • Identity as a Service
    An Identity Management platform provides a single service from which IT teams can manage people, applications, and policies across all cloud and web applications. An administrative dashboard contains a summary of key usage and activity statistics, notifications of any problems or outstanding work to be completed, as well as shortcuts to the most commonly performed tasks. For end-users, this means receiving a customised homepage providing single sign-on and self-services across applications, and credentials. A Platform that provides single sign-on and supports BYOD while providing IT with an easy way to manage accounts and secure access with automated provisioning of apps, device management and flexible policy enforcement. Extensibility to include Multifactor authentication enabling flexible verification options, including SMS, security question, or soft token.

  • Data Security and Compliance
    Identify sensitive data in motion or at rest in cloud services and enforce data loss prevention policies to comply with industry regulations and internal policies. A Security Policy Audit discovers current cloud application security settings and suggests modifications to improve security based on industry best practices. Provide a detailed and view of sensitive data stored or uploaded to cloud services and enforces DLP policies based on data identifiers, keywords, and regulatory expressions and support alerting, blocking, encrypting, tombstoning an quarantining actions. A unified interface to both review and remediate all DLP, access control or collaboration policy violations, with integration and closed loop remediation with existing DLP solutions, ensuring investment protection
  • Threat Protection
    Identify, mitigate, and remediate insider threats, compromised accounts, and privileged user threats in trusted cloud services and deliver a security intelligence dashboard and incident-response workflow for potential insider / privilege user threats, compromised account and flight risks. Provides a comprehensive audit trail of all user and admin activities to support post-incident investigation and forensics. A self-learning model based on multiple heuristics and identifies anomalies indicative of insider threat data exfiltration.

  • Shadow IT vs Sanctioned IT
    Gain continuous visibility into cloud usage and risk and uncover all Cloud Services, "Shadow IT", in use while assigning a risk rating developed with the Cloud Security Alliance. The ability to consolidate Cloud Services and reduce cost and risk by leveraging usage analytics to identity redundant Cloud Services within a category and guide users and organisations to transition to "Sanctioned", enterprise-ready services. A Cloud registry and Trust rating allows customers to Benchmarks risk with peers, while tracking changes over time and implement actionable recommendation to reduce Cloud usage risks.

LET'S discuss a solution for you