Cloud Access Security Broker (CASB)

  • Visibility – Sanctioned/Unsanctioned IT Discovery
  • Consolidated Organizational Service Usage
  • User Access Visibility
  • Device and Location Specification
  • Security Posture Assessment
  • Data Security
  • Enforce Data-Centric Security Policies
  • Prevent Unwanted Activity
  • Data Loss Prevention (DLP)
  • Import Policies
  • Threat Protection
  • Access Controls – Privilege Escalation
  • Prevent Unwanted Devices, Users, Application Versions
  • User and Entity Behavior Analytics (EUBA)
  • Malware ID & Remediation
  • File Sandboxing
  • Demonstrate Compliance – Gov’t, Agency, Internal Requirements
  • Proxy/Reverse Proxy
  • Mobile Device Management (MDM)
  • Identity and Access Management as a Service (IDaaS)
  • Key Management Interoperability Protocol (KMIP) Interface