Forcepoint CASB Description

Allow the cloud to unlock the potential for your company. However, you shouldn't let this cost you data control. Cloud Access Security Broker solutions can now support any cloud app, managed and unmanaged, securely. Forcepoint CASB can be used with IdPs like Okta and Ping. CASB allows you to reuse segments that you have already built. You don't yet have IdP? CASB functions like an IdP, allowing your team members to add apps and manage individual access to them. Employees will find the interface simple and easy to use. Shadow IT makes data unavailable for you. Your web proxy and firewall logs allow you to quickly identify managed and unmanaged cloud applications in real-time. Patent-pending Zero Trust Impossible Travel helps you detect stolen credentials faster. It shows the individual device method, location, time of day, and time. Data can move up to the cloud, from it, down from there, and from one cloud to another. Data can be protected in motion and at rest. To track sensitive data, block data in transit, encrypt, mask, redact, or watermark it.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Forcepoint
Year Founded:
1994
Headquarters:
United States
Website:
www.forcepoint.com

Media

Forcepoint CASB Screenshot 1
Recommended Products
Twilio Segment - the Leading Customer Data Platform Icon
Twilio Segment - the Leading Customer Data Platform

Get started with a free Segment account and access 450+ integrations, features and capabilities.

We’ll show you how Segment helps 25,000+ businesses to collect, clean, and activate their data. Twilio is the #1 CDP for market share four years in a row per IDC (2019-2022).

Product Details

Platforms
SaaS
Type of Training
Documentation
Customer Support
24/7 Live Support
Online

Forcepoint CASB Features and Options

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management