Cloud Application Control

Cloud-Based Application Control for Visibility, Control & Security for All Cloud Applications


Make it safe and productive for employees to take advantage of web 2.0, private cloud and public cloud applications.


> Visibility and control for cloud apps

> Identify all application use and analyse related risks

> Ensuring compliance with corporate policies and protecting against data loss.

> Set and Enforce Acceptable Usage Policy - to ensure regulatory and corporate compliance; and cloud application security - to protect against advanced threats.

> Control access and data flow over corporate Datacentre web applications and cloud consumer apps like Salesforce, SharePoint, Facebook, Gmail.



Moving and using Cloud apps (Salesforce.com, Dropbox, Office 365, NetSuite and hundreds of others) outside the corporate presents a challenge and blind spot for IT network has created a blind spot for IT. There is also a requirement to ensure employees are not sending and sharing corporate sensitive data through consumer cloud apps (Gmail, DropBox, Outlook, Facebook...). 



Security-as-a-Service
Security as a Service platform provides a comprehensive suite of security services, including protection against advanced persistent threats / zero-day attacks. Whether security threats are coming from a compromised cloud application or from a malicious file in stored in a cloud storage provider, our solutions will ensure you are protected.




















SSL inspection
All major cloud applications now use SSL encryption. Ensure you can decrypt and inspect SSL traffic, ensuring threats and data loss can’t hide behind encryption.




Data Loss Prevention 
Protect your intellectual property from leaking out to cloud applications - whether intentionally or by accident. Detect and intervene if an employee tries to save a document marked company confidential to Box.net, or if an employee tries to send an email containing credit card numbers in Gmail.



Comprehensive Cloud Application Discovery & Visibility


Real-time Discovery and cataloging of all cloud apps accessed by users. Get detailed reporting on the cloud applications being used within your organisation and by your mobile work force.
 

It’s not uncommon for organisations to think they are using a handful of cloud applications, and then after find that their employees are using hundreds.
 

Administrators get detailed information at the user and department level, and can run reports on an ad-hoc or a scheduled basis. This approach helps in setting application usage policy and bandwidth capacity planning and simplifies security and compliance event analysis. It’s also very helpful during risk audits - IT can quickly provide finance with a list of all cloud applications in use across the enterprise.
 

View summary statistics on apps, users, data volume, and overall risk. Additionally, baseline and drill-down views and powerful on-screen filtering help security managers quickly view, assess, and remediate risks.

Additionally, numerous metrics are provided to help organisations understand the risks associated with the use of each cloud app. Risk metrics such as the status of service provider audits (e.g. SSAE 16), compliance requirements (e.g. PCI AoC) and many other critical criteria are consolidated and measured so organisations can use the risk score of each app to prioritise their app migration efforts and ensure users are safe and productive.

The non-intrusive process does not require any installation of agents or changes to applications.

 


Cloud Storage Access  
Visibility and control over what documents employees can share, using authorised and unauthorised cloud storage services such as Microsoft Office 365, Dropbox, iCloud Drive, OneDrive and Box.


Granular Cloud Application Control
 
Cloud services including email, file sharing, CRM, financials and HR apps reduce costs for organisations but can introduce significant risks to critical information assets. As sensitive and business-critical data moves to the cloud.
  • Discover all cloud apps and who is using them
  • Analyse app risks, monitor user activity and access to sensitive data
  • Enforce consistent policies across all apps and immediately detect and prevent attacks based on anomalous behaviour.
Administrators can set granular user-level controls for cloud applications defining what kind of access is allowed, for whom and when .

Organisations might define an acceptable use policy that lets all employees view Facebook for a certain number of hours per day, but only allows approved employees in a certain department to post content. Similarly, an organisation might provide access to all its employees to YouTube to watch training videos, but only allow certain employees the ability to upload videos.




Bandwidth Improvement
 
Media applications such as streaming video, music and web-based games can consume a great deal of network resources if left unchecked. Heavy use can crowd out mission-critical communications and applications running on your network - reducing employee productivity and forcing organisations to purchase unneeded bandwidth.

Allocate bandwidth by application name, type, location, or on a time-sensitive basis to ensure that traffic for business critical apps like Salesforce and Office 365 is prioritised over that from streaming media applications like YouTube. All of this is completely seamless to your employees - they may simply notice that YouTube plays at a lower quality rate (allowing them access to content, while saving your network from being saturated by HD streaming content). 







Contact us today to discuss your requirements in more detail.



P: +44(0)7714 209927

S: +44(0)1273 329753

info@securenetconsulting.co.uk