Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

A Cloud Access Security Broker (CASB) effectively secures cloud users, data, and applications with minimal hassle. Cisco Cloudlock serves as an API-centric CASB designed to facilitate and expedite cloud utilization. By safeguarding identities, data, and applications, Cloudlock addresses issues related to account compromises, security breaches, and the inherent risks in the cloud app ecosystem. Our API-based methodology offers a straightforward and transparent approach that promotes healthy cloud adoption. Protect your organization from compromised accounts and internal threats using our User and Entity Behavior Analytics (UEBA), which analyze a comprehensive array of cross-platform activities to enhance visibility and detection capabilities. In addition, protect against data exposure and security breaches with a highly configurable data loss prevention engine that implements automated, policy-driven responses. The Cloudlock Apps Firewall not only identifies and manages risky cloud applications integrated into your corporate infrastructure but also offers a community-sourced Trust Rating to assess the risk associated with individual apps. Overall, Cisco Cloudlock provides a robust framework for securing cloud environments while supporting safe innovation and growth.

Description

Transform your cloud footprint from an opaque entity to a transparent resource with our top-tier Cloud Access Security Broker (CASB), which is a vital part of Skyhigh Security's Secure Service Edge (SSE). It identifies sensitive data stored in cloud services while addressing any content violations. The system implements real-time controls to safeguard data during user interactions, offering detailed content sharing and access permissions. It features the largest and most precise catalog of cloud services, assessed through a customizable 261-point risk evaluation to enhance risk-aware cloud governance strategies. Additionally, it maintains a thorough audit trail documenting all user and administrator actions, which is essential for post-incident reviews and forensic analyses. By employing machine learning, it identifies behaviors indicative of negligence or malicious intent, such as insider threats involving the theft of sensitive information. Furthermore, it secures sensitive structured data through peer-reviewed encryption techniques that preserve functionality while utilizing keys controlled by the enterprise itself, thereby ensuring comprehensive protection across all fronts. This integrated approach not only bolsters security measures but also fosters a culture of accountability within cloud operations.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

1Kosmos
Acxiom Real Identity
Altair Knowledge Hub
Avatier Identity Anywhere
Cisco Webex
Dedrone DroneTracker
DoubleClue
Expel
F5 BIG-IP DDoS Hybrid Defender
Google Workspace
IBM Datacap
IBM Verify
Microsoft 365
Nexpose
RapidScale Identity as a Service
Salesforce
Spirion
Splunk User Behavior Analytics
UltraDDoS Protect

Integrations

1Kosmos
Acxiom Real Identity
Altair Knowledge Hub
Avatier Identity Anywhere
Cisco Webex
Dedrone DroneTracker
DoubleClue
Expel
F5 BIG-IP DDoS Hybrid Defender
Google Workspace
IBM Datacap
IBM Verify
Microsoft 365
Nexpose
RapidScale Identity as a Service
Salesforce
Spirion
Splunk User Behavior Analytics
UltraDDoS Protect

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cisco

Founded

1984

Country

United States

Website

www.cisco.com/c/en/us/products/security/cloudlock/index.html

Vendor Details

Company Name

Skyhigh Security

Founded

2022

Country

United States

Website

www.skyhighsecurity.com/en-us/products/cloud-access-security-broker.html

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Alternatives

Censornet CASB Reviews

Censornet CASB

Censornet

Alternatives

FortiCASB Reviews

FortiCASB

Fortinet
Check Point CloudGuard Reviews

Check Point CloudGuard

Check Point Software Technologies