top of page
bg-bg-3_edited.jpg
Proofpoint_R_Logo_edited.jpg

Proofpoint

Cloud Security

Overview

Proofpoint Cloud App Security Broker (Proofpoint CASB) helps you secure applications such as Microsoft Office 365, Google Workspace, Box and more. It gives you people-centric visibility and control over your cloud apps, so you can deploy cloud services with confidence. What’s more, our powerful analytics help you grant the right levels of access to users and third-party add-on apps based on the risk factors that matter to you.

Features

Activity Mapping

People-Centric Visibility Proofpoint CASB gives you granular visibility into your users and data at risk. You get a people-centric view of cloud access and sensitive-data handling. With Proofpoint CASB, you can:  Gain insight into cloud usage at a global, app and user level Identify files at risk, including ownership, activity and who they were shared with Check suspicious logins, activity and DLP alerts via drill-down dashboards

Policy Enforcement

Proven Advanced Threat Protection Proofpoint CASB extends our people-centric security to the cloud. It allows you to detect, investigate and defend against cyber criminals who are accessing your sensitive data and trusted accounts. We combine user-specific risk indicators with threat intelligence across email, SaaS and others to detect anomalies in your cloud apps. These include account takeover, suspicious file activities and more.  If an unsafe file gets uploaded to a cloud-based collaboration app, it can spread to your entire organization in an instant. But with our sandboxing and analytics, you can contain those malicious files in the cloud through an automated quarantine and other mitigation steps.  Our robust policy capabilities alert you to issues in real time. And to prevent unauthorized or risky access, you can apply adaptive access controls. These include enforcing multi-factor authentication and restricting access from unmanaged devices.

IIA symbol 350.png

Information Intelligence Association

Contact Us

©2020 by Information Intelligence Association (IIA)

bottom of page