Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

A Cloud Access Security Broker (CASB) effectively secures cloud users, data, and applications with minimal hassle. Cisco Cloudlock serves as an API-centric CASB designed to facilitate and expedite cloud utilization. By safeguarding identities, data, and applications, Cloudlock addresses issues related to account compromises, security breaches, and the inherent risks in the cloud app ecosystem. Our API-based methodology offers a straightforward and transparent approach that promotes healthy cloud adoption. Protect your organization from compromised accounts and internal threats using our User and Entity Behavior Analytics (UEBA), which analyze a comprehensive array of cross-platform activities to enhance visibility and detection capabilities. In addition, protect against data exposure and security breaches with a highly configurable data loss prevention engine that implements automated, policy-driven responses. The Cloudlock Apps Firewall not only identifies and manages risky cloud applications integrated into your corporate infrastructure but also offers a community-sourced Trust Rating to assess the risk associated with individual apps. Overall, Cisco Cloudlock provides a robust framework for securing cloud environments while supporting safe innovation and growth.

Description

Integrating visibility, analytics, and automated control into a unified solution streamlines the workflow for security analysts. By utilizing UEBA's automated policy enforcement and thorough user risk scoring, you can simplify complex processes. Merging DLP with behavioral analytics allows for a comprehensive perspective on user intent and actions throughout the organization. You have the option to utilize pre-built analytics or tailor risk models to align with your specific organizational requirements. With a quick glance, you can identify risk trends by viewing users ranked by their risk levels. Harness the full potential of your IT ecosystem, including unstructured data sources such as chat, to achieve a holistic understanding of user interactions across the enterprise. Gain insights into user intent through in-depth context enabled by big data analytics and machine learning technologies. In contrast to conventional UEBA systems, this approach empowers you to take proactive measures on insights, preventing breaches before they lead to significant losses. Consequently, you can effectively shield your personnel and data from insider threats while ensuring rapid detection and response capabilities. Ultimately, this comprehensive strategy promotes a safer organizational environment.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Okta
Acxiom Real Identity
Check Point Infinity
Cisco Webex
Corelight
Cylera Platform
Expel
F5 Distributed Cloud DDoS Mitigation Service
Forcepoint ONE
IBM Verify
OneLogin
PowerTerm InterConnect
PowerTerm Pro
RapidScale Identity as a Service
SentryWire
Slack
Splunk User Behavior Analytics
Trustwave DbProtect
UltraDDoS Protect

Integrations

Okta
Acxiom Real Identity
Check Point Infinity
Cisco Webex
Corelight
Cylera Platform
Expel
F5 Distributed Cloud DDoS Mitigation Service
Forcepoint ONE
IBM Verify
OneLogin
PowerTerm InterConnect
PowerTerm Pro
RapidScale Identity as a Service
SentryWire
Slack
Splunk User Behavior Analytics
Trustwave DbProtect
UltraDDoS Protect

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cisco

Founded

1984

Country

United States

Website

www.cisco.com/c/en/us/products/security/cloudlock/index.html

Vendor Details

Company Name

Forcepoint

Founded

1994

Country

United States

Website

www.forcepoint.com/product/ueba-user-entity-behavior-analytics

Alternatives

Censornet CASB Reviews

Censornet CASB

Censornet

Alternatives

FortiInsight Reviews

FortiInsight

Fortinet
FortiCASB Reviews

FortiCASB

Fortinet
Securonix UEBA Reviews

Securonix UEBA

Securonix