CLOUDLOCK

CloudLockWorried that your users could be storing sensitive data in the cloud? Credit card numbers? Social insurance numbers? Information that could put your organization in a very bad public light, and perhaps have devastating financial impact?

CloudLock monitors your cloud applications and notifies you of any breaches based on policies defined for your environment. Pre-defined policies for PCI, HIPAA, SOX compliance (and more) make it incredibly easy and fast to start protecting your data. Custom policies can also be defined to protect what is sensitive to your business.

Monitor sensitive user behaviour, as well; an employee logging in to Office 365 from Toronto, Canada and 15 minutes later from London, England would trigger an incident and alert security personnel to suspicious activity. Sharing of sensitive data can be detected, security personnel alerted, and the share automatically removed before data gets exposed.

With over 100,000 apps that can be protected, you can ensure that your cloud data is safe.

Compromised Accounts

Analyze User and Entity Behavior

  • Detect violations of whitelisted country access policies.
  • Add geolocation visualizations to user activities and incidents.
  • Detect suspicious login events, including two-factor authentication failures, disabled account login failures, and impersonation events.
  • Aggregate data from across multiple cloud environments to pinpoint anomalous behavior with enhanced accuracy.

Data Breaches

Detect, classify, and control sensitive data

  • Continuously monitor attachments and files in real-time.
  • Leverage rich policy templates (e.g., HIPAA, PCI, PII, regular expressions, IP, text) to safeguard critical assets.
  • Identify excessively exposed, sensitive information within Office 365, such as intellectual property or confidential financial information, through customizable policies.
  • Quarantine excessively exposed sensitive information through automated policy-driven response actions.

Compliance

Detect, classify, and control sensitive data

  • Leverage pre-built policies to detect credit card numbers (for PCI compliance), protected health information (for HIPAA compliance), and personally identifiable information (PII).
  • Provide audit reports on user activities, security incidents, and administrator actions.

SecOps & Forensics

Manage Incidents

  • Centrally manage, investigate and take action on incidents across your entire public cloud portfolio.
  • Gain real-time insight into the health of your public cloud environment in one unified dashboard with security analytics.
  • Track user access of privileged user modifications and change permission history and leverage location-aware auditing to monitor suspicious behavior.
  • Record an immutable audit log of all actions performed as evidence for regulatory compliance and internal policies.

NEW! smb:Advantage for Small Business

Adaris is proud to be able to offer small business customers monthly billing for Microsoft Office 365, along with managed services.

Find out more about our smb:Advantage service here

Pin It on Pinterest

Share This