CipherCloud Update Helps Admins Handle 'Rogue IT'
CipherCloud on April 23 added a new feature, Cloud Data Discovery, to its cloud information protection platform.
Cloud Data Discovery enables enterprises to adopt software-as-a-service (SaaS) and cloud applications while ensuring that their compliance policies are fully met and their business information is always protected.
With the addition of the new capability in the CipherCloud platform, enterprises can now gain full granular visibility into all of the information their users are sharing across all of their cloud applications.
This is a clear-cut solution for so-called "rogue IT," in which employees use cloud apps on their own for business purposes, causing potential security issues. IT admins can keep track of all such business-relation information using this system.
CipherCloud's product portfolio protects popular cloud applications out-of-the-box such as Salesforce, Force.com, Chatter, Box, Google Gmail, Microsoft Office 365, and Amazon Web Services. Additionally, CipherCloud Connect AnyApp and Database Gateway enable organizations to extend data protection to hundreds of third-party cloud and private cloud applications and databases.
An organization's data loss prevention and compliance policies can be effectively applied to all discovered information delivering full visibility to an organization's content in the cloud. Easy-to-read dashboards deliver detailed visibility to all of the information that is going into an organization's cloud applications, including those noted above.
CipherCloud's Cloud Data Discovery also provides:
--Comprehensive content monitoring and detection: Real-time monitoring and detection of organizational policy violations across all cloud applications
--Full policy compliance: Effective compliance tracking with CipherCloud's cloud DLP offering or via integration with existing enterprise DLP templates (such as Symantec Vontu) and with out-of-box DLP templates (PII, PCI, HIPAA, etc.).
--Granular dashboards: Insightful dashboards highlight violations of policies at the organization, user and location level.
This is available now. For more information, go here.