Discover and assess risks
Identify cloud apps on your network, gain visibility into shadow IT, and get risk assessments and ongoing analytics.
Control access in real time
Manage and limit cloud app access based on conditions and session context, including user identity, device, and location.
Protect your information
Get granular control over data and use built-in or custom policies for data sharing and data loss prevention.
Detect and protect against threats
Identify high-risk usage and detect unusual activities with Microsoft behavioral analytics and anomaly detection capabilities.
Cloud App Security helps you to stay ahead of attackers. You can identify anomalies in your cloud usage that
may be indicative of a data breach. Cloud App Security advanced machine learning heuristics learn how each
user interacts with each SaaS application and, through behavioral analysis, assesses the risks in each
transaction. This includes simultaneous logins from two countries, the sudden download of terabytes of data,
or multiple failed login attempts that may signify a brute force attack.
Cloud App Security not only discovers 13,000 cloud applications in use, but also provides a risk score by
evaluating each discovered service against more than 60 parameters: evaluating the service provider, security
mechanisms, and compliance certifications. These details help determine and assess the credibility and
reliability of each cloud service discovered, represented by a risk score. Cloud App Security gives you the
tools to perform a total risk assessment for each service, based on a combination of risk score and usage.
Discovering which applications are in use across an organization is just the first step in making sure
sensitive corporate data is protected. Understanding use cases, identifying top users, and determining the
risk associated with each application are all important components to understanding an organization’s overall
risk posture. With Cloud App Security, we provide ongoing risk detection, analytics, and powerful reporting on
users, usage patterns, upload/download traffic, and transactions so that you can identify anomalies right
Granular-control security policies can be built easily. You can use out-of-the-box policies or build and customize your own. Every insight is actionable, allowing you to remediate with a single click or implement data sharing and granular usage policies.
You can govern data in the cloud, such as files that are stored in cloud drives, as attachments, or within cloud application fields. Use pre-defined fields or extend existing enterprise DLP policies to your SaaS applications. Dynamic reports can run on DLP violations, sensitive file sharing, and datasharing violations. Data control in the cloud helps you comply with regulatory mandates such as PCI, HIPPA, and more.