Product :

About Forcepoint CASB

Cloud apps allow organizations to reduce costs and elastically allocate resources—but also introduce risks to security and compliance posture. The acceleration of cloud app adoption in the workplace, along with the proliferation of BYOD, has created a need to secure cloud-based, sanctioned apps like Office 365, Dropbox and Salesforce. Preventing data loss and enforcing granular access controls are justifiably top of mind for IT. Employees can be a major source of security risk, as malicious insiders look to take advantage of their unfettered access to an organization’s cloud apps to exfiltrate data.

Forcepoint CASB extends traditional cloud app discovery information by providing details on risk factors that are unique and specific to your organization. For instance, Forcepoint CASB provides visibility into dormant (i.e., inactive) accounts, orphaned accounts (e.g., exemployees) and external accounts (e.g., contractors) that present a variety of security risks.

Forcepoint CASB monitors and controls uploads, downloads and sharing of sensitive data based on various criteria such as by destination, user or cloud app. Moreover, it scans your corporate data stored in file-sync services like OneDrive and Box, highlighting those files that are sensitive or regulated so that you can apply the appropriate policy (e.g., send an alert) to mitigate risk.

Forcepoint CASB automatically detects and blocks threats to cloud applications and enforces risk-mitigation policies. Through unique fingerprinting techniques, Forcepoint CASB quickly establishes detailed behavioral profiles based on the normal usage patterns for each user, department and device. Any access that fails the fingerprint test can be configured to immediately alert, block or require twofactor authentication in real-time. You can also quickly create custom policies and enforce them across selected cloud apps.

Forcepoint CASB enables you to block or restrict cloud app access from unmanaged endpoints (e.g., BYOD or personally owned devices), providing a cost-effective alternative to routing all remote access through a VPN. Additionally, Forcepoint CASB has built-in adaptors that make it easy to integrate with enterprise directories and marketleading SIEM solutions.

Forcepoint CASB's Benefits

1

Shadow IT Solutions

Knowing about what is not known! A CASB solution provides visibility into Shadow IT operations, which helps in identifying risky cloud applications, prevent dangerous usage of unsanctioned applications, and also identify the most vulnerable users who are at risk. To comply with rules and regulations like HIPAA, one needs to be selective in choosing cloud applications (sanctioned apps) and define compliance policies and regulations according to the workflow. It will ensure compliance and security of data that may be intended to put over the cloud. Those apps which the organizations deem risky can be categorized as unsanctioned apps, and their usage can be restricted. Types of sanctioned apps include “productivity apps” such as Office 365, “File Collaboration Apps” such as Box or DropBox or Google Apps, and “Line of Business Apps” support and marketing apps, R&D apps, etc

2

Prevent Cyber Threats

Threats can be real or virtual and external or internal. One needs to strengthen cloud security using a CASB solution to mitigate these threats most effectively. People who are looking to compromise enterprise data are always looking to target insecure data networks. By deploying a robust CASB solution, one can mitigate both the external as well as internal threats at ease. It is possible to restrict data access within groups, monitor users’ online behavior in real-time, track individuals or groups prohibited activities, manage BYOD access, and even control external file sharing over the cloud network

3

Prevent Data Leakage

A robust CASB solution must have a specific module working to prevent data leakage or Data Loss Prevention (DLP). DLP solutions enable the organization to critically enforce and impose restrictions on user activities, thereby not providing the chance for malicious intents to carry out their business. The limits can be in the form of device restriction, access restriction, restriction to Geo-location, time restriction, etc. Thus, the deployment of a CASB solution gives better control over granting permissions to users of different sets of an organization. This DLP controls both data in motion as well as data at rest

4

Manage Privileged Accounts & Admin

A perfect CASB solution enables an enterprise to manage and streamline its cloud operations effectively. This process is done by prioritization and management of privileged accounts, and enforcing various permutations and combinations of restrictions as well as permissions to access and manage data in the safest way. The admin mostly has higher privileges and rights. Thus, if an organization perceives a threat inside the admin sections, it will be coined as a serious threat as it may transition into more significant losses than compared to a user at the bottom of the hierarchy

5

Control over External File Sharing

Using a Personal Gmail Block feature, one can restrict the users of the enterprise to ensure that they are not able to use their personal Gmail accounts to proliferate confidential and private data of customers. As Gmail is open-source and is merely free of cost, there is this innate tendency of ill-intended people to exploit it at any time in their favor. Thus, this personal Gmail block feature is a crucial feature of a CASB solution that mitigates the threat of data leakage or unwanted proliferation