Microsoft Cloud App Security:
Enterprise-grade security for your cloud apps
WHAT IS CLOUD APP SECURITY?
Discover all your cloud apps in your network, gain visibility into Shadow IT and assess risk--no agents required.
Shape your cloud environment with granular controls and use out-of-the-box or custom policies for data sharing and data loss prevention.
Identify high-risk-usage and cloud security issues, detect abnormal user behavior and prevent threats.
How Cloud App Security is different
Discovery tools collect information from firewalls and proxies to know which cloud apps are in use—identifying over 13,000 apps—to assess risk. No agents required.
Deep Office 365 integration
Through deep integration, Cloud App Security provides advanced security management capabilities for Office 365 apps.
Comprehensive controls for sanctioned apps
Approving apps isn't enough to deal with cloud security issues. You need to maintain control over them. From data sharing to data loss prevention, set policies and enforce them right away on your cloud apps—whether from Microsoft or third parties.
Protection enhanced by Microsoft security intelligence
Offering a simple deployment and management process, Cloud App Security is scalable, non-intrusive, and integrates with your current solutions—including existing security information and event management systems, identity and access management, single sign-on, and analytical solutions.
Builds on the broader Microsoft security platform
Cloud App Security works together with our current identity and security solutions—including Azure Active Directory, Microsoft Advanced Threat Analytics, and Azure Information Protection. Plus, it’s part of Enterprise Mobility + Security, delivering a holistic, innovative and identity-driven approach to SaaS security.
User behavioral analytics
Cloud App Security helps you to stay ahead of attackers. You can identify anomalies in your cloud usage that may be indicative of a data breach. Cloud App Security advanced machine learning heuristics learn how each user interacts with each SaaS application and, through behavioral analysis, assesses the risks in each transaction. This includes simultaneous logins from two countries, the sudden download of terabytes of data, or multiple failed login attempts that may signify a brute force attack.
Policy setting and enforcement
Granular-control security policies can be built easily. You can use out-of-the-box policies or build and customize your own. Every insight is actionable, allowing you to remediate with a single click or implement data sharing and granular usage policies.
DLP and Data Sharing Control
You can govern data in the cloud, such as files that are stored in cloud drives, as attachments, or within cloud application fields. Use pre-defined fields or extend existing enterprise DLP policies to your SaaS applications. Dynamic reports can run on DLP violations, sensitive file sharing, and datasharing violations. Data control in the cloud helps you comply with regulatory mandates such as PCI, HIPPA, and more.
Cloud App Security not only discovers 13,000 cloud applications in use, but also provides a risk score by evaluating each discovered service against more than 60 parameters: evaluating the service provider, security mechanisms, and compliance certifications. These details help determine and assess the credibility and reliability of each cloud service discovered, represented by a risk score. Cloud App Security gives you the tools to perform a total risk assessment for each service, based on a combination of risk score and usage.
Powerful reporting and analytics
Discovering which applications are in use across an organization is just the first step in making sure sensitive corporate data is protected. Understanding use cases, identifying top users, and determining the risk associated with each application are all important components to understanding an organization’s overall risk posture. With Cloud App Security, we provide ongoing risk detection, analytics, and powerful reporting on users, usage patterns, upload/download traffic, and transactions so that you can identify anomalies right away.
This website is using cookies.
We use only non-persistent cookies that are essential for the normal functionality of the site. No personal data are stored in our cookies.