Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Founded in 2011, CloudCodes specializes in providing cloud security solutions aimed at enterprise customers through its innovative single sign-on system. Our mission is to create a straightforward, effective, and efficient platform that secures cloud applications for businesses. We deliver integrated solutions that grant robust control over data management. Recognized by Gartner as a notable vendor in both Cloud Security and SaaS Security, CloudCodes is committed to promoting data governance across various devices for enterprises. Our suite of cloud security applications, including G Suite, Office 365, Slack, and Jira, safeguards sensitive business information, mitigates online threats, and proactively addresses cyber risks and potential data loss. By allowing businesses to manage access to their data, we empower them to establish and implement effective governance policies tailored for users. Ultimately, our solutions not only enhance security but also streamline the management of permissions, ensuring an optimal balance between accessibility and protection for all business data.
Description
Unlock the full capabilities of the cloud for your organization while maintaining control over your data. With a Cloud Access Security Broker (CASB) solution, you can securely manage both managed and unmanaged cloud applications. Forcepoint CASB integrates seamlessly with identity providers like Ping and Okta, allowing you to leverage existing segments you've created. If you don't yet have an identity provider, the CASB can function in that capacity, simplifying the process for your team to add applications and control access on an individual basis. The user-friendly interface ensures that employees can navigate it with ease. The risks associated with Shadow IT can lead to data being left unprotected, but you can swiftly identify both managed and unmanaged cloud applications in real-time using your web proxy and firewall logs. Additionally, the innovative Zero Trust Impossible Travel technology helps you detect compromised credentials more quickly by tracking the method, location, and time of access from individual devices. As data flows to and from the cloud, and even between different cloud services, it's crucial to safeguard it whether it's in transit or stored. You can block data during transit, encrypt or mask it, redact sensitive information, or apply watermarks for tracking purposes, ensuring that your vital information remains secure. Furthermore, taking proactive measures to protect your data not only enhances security but also establishes trust within your organization.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Forcepoint ONE
Imperva CDN
Imperva DDoS Protection
Imperva WAF
OneTrust Privacy Automation
Scuba Database Vulnerability Scanner
Integrations
Active Directory
Forcepoint ONE
Imperva CDN
Imperva DDoS Protection
Imperva WAF
OneTrust Privacy Automation
Scuba Database Vulnerability Scanner
Pricing Details
$8.00/year/user
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
CloudCodes
Country
India
Website
www.cloudcodes.com
Vendor Details
Company Name
Forcepoint
Founded
1994
Country
United States
Website
www.forcepoint.com
Product Features
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management