Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

A Cloud Access Security Broker (CASB) effectively secures cloud users, data, and applications with minimal hassle. Cisco Cloudlock serves as an API-centric CASB designed to facilitate and expedite cloud utilization. By safeguarding identities, data, and applications, Cloudlock addresses issues related to account compromises, security breaches, and the inherent risks in the cloud app ecosystem. Our API-based methodology offers a straightforward and transparent approach that promotes healthy cloud adoption. Protect your organization from compromised accounts and internal threats using our User and Entity Behavior Analytics (UEBA), which analyze a comprehensive array of cross-platform activities to enhance visibility and detection capabilities. In addition, protect against data exposure and security breaches with a highly configurable data loss prevention engine that implements automated, policy-driven responses. The Cloudlock Apps Firewall not only identifies and manages risky cloud applications integrated into your corporate infrastructure but also offers a community-sourced Trust Rating to assess the risk associated with individual apps. Overall, Cisco Cloudlock provides a robust framework for securing cloud environments while supporting safe innovation and growth.

Description

Enhance your security framework by asserting dominance over your cloud ecosystem. Utilize Microsoft Cloud App Security, a cloud access security broker (CASB), to pinpoint and mitigate cyber threats spanning all your cloud services, offering comprehensive visibility, data travel management, and advanced analytics. Simplify your approach to cloud access security by managing, regulating, and auditing your applications and resources through Cloud App Security. Uncover shadow IT within your organization, gain insights into your digital information landscape, and leverage this knowledge to your benefit. Employ real-time controls to fortify threat protection across all access points interacting with your environment. Achieve a deeper understanding of your cloud applications and services while leveraging advanced analytics to proactively identify and address cyber threats. Regulate the consumption of your data, regardless of its location, and uncover the cloud applications and services in use within your organization. Detect any irregular activities across your cloud applications to uncover ransomware incidents, compromised user accounts, or unauthorized applications that may pose a risk. By maintaining vigilance and employing these strategies, you can significantly bolster your organization's overall security posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Microsoft 365
Nexpose
Acxiom Real Identity
Altair Knowledge Hub
Booz Allen MDR
DNSWatch
Dedrone DroneTracker
Digital Guardian
DoubleClue
Expel
IBM Verify
Mandiant Managed Defense
Microsoft Power Platform
OneLogin
RapidScale Identity as a Service
Slack
ThreatSync
UltraDDoS Protect

Integrations

Microsoft 365
Nexpose
Acxiom Real Identity
Altair Knowledge Hub
Booz Allen MDR
DNSWatch
Dedrone DroneTracker
Digital Guardian
DoubleClue
Expel
IBM Verify
Mandiant Managed Defense
Microsoft Power Platform
OneLogin
RapidScale Identity as a Service
Slack
ThreatSync
UltraDDoS Protect

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$14.80 per user per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cisco

Founded

1984

Country

United States

Website

www.cisco.com/c/en/us/products/security/cloudlock/index.html

Vendor Details

Company Name

Microsoft

Founded

1975

Country

United States

Website

www.microsoft.com/en-us/microsoft-365/enterprise-mobility-security/cloud-app-security

Alternatives

CloudSOC CASB Reviews

CloudSOC CASB

Broadcom

Alternatives

Red Sift ASM Reviews

Red Sift ASM

Red Sift
Trend Cloud One Reviews

Trend Cloud One

Trend Micro