Microsoft Corporation Cloud App Security Features
Microsoft Corporation Cloud App Security provides such effective and comprehensive protection of all your business’ data by harnessing tools that allow for intelligent, fast solutions while providing real-time monitoring and controls. With Cloud App Security, you can see everything happening on your server and act quickly and flexibly to prevent harm before it can occur.
Cloud Discovery uncovers and analyzes cloud traffic—With Cloud Discovery, you can use traffic logs to analyze the apps being used by your organization in the cloud. These log files can come from firewalls and proxies, which can then be analyzed to create snapshot reports or continuous reports depending on a single set of traffic logs or a continual forwarding of traffic logs. These reports will include scores for apps based on a catalog of over 15,000 apps and over 60 risk factors. The reports include how each app might affect your cloud environment. They will also lay out anomalies discovered.
Sanctioning and unsanctioning apps—Once you know the risk score for the apps you are running, you can decide whether you want to sanction the use of that app for your organization’s use. By unsanctioning risky apps, you help avoid potential issues before they can develop.
Compliance, data retention and protection—Cloud App Security is a trusted compliance method that is certified for HIPAA, ISO, EU, and other model clauses. When Cloud App Security runs inspections, it only works with metadata, thus making sure data privacy is protected. Data is only retained for between 90 and 180 days, depending on the type of data.
Data loss prevention—Cloud App Security has several simple ways to provide data loss prevention across your cloud space. The controls allow for remediation of documents, through such methods as quarantine or restrictions on sharing. The system can be scanned, classifying files and protecting them with encryption.
App connectors—One of the great abilities of Cloud App Security is to directly connect Cloud App Security to the apps in the cloud. With this direct connection, it’s easier to control and protect the apps, while it also makes it possible to get direct information from the apps.
Proxy protection—To provide true protection, you need to do more than monitor the cloud environment, you need to be able to protect data leaving the server. To do that, Cloud App Security includes the ability to block downloads before they occur, make sure all downloaded at a is encrypted, monitor unmanaged devices, and decide on the level of access provided to risky IP addresses.
This is only the beginning, though. You have the ability to limit what users can do based on their location, device, and the assessment of their risk level at sign-in. Essentially, you have control over who signs-in, what they can do, and what data they are allowed to download.
Behavior analytics and behavior controls—Even if a user appears to pass your initial risk assessment, they may still be a risk to your sensitive data. Cloud App Security protects you even at this stage through threat intelligence, which detects and analyzes risky behavior and violations. When risky behavior is detected, Cloud App Security will know how to respond based on the policies you set, such as remediation of files or user suspension.
Fight off ransomware attacks—Of particular use to all businesses extensively using the cloud is prevention of a ransomware attack. Cloud App Security monitors for this type of attack and then uses a build-in template that allows you to decide how you wish to deal with the problem. You can, for example, suspend users or prevent encryption of the user’s files, among other options.
Integration with already existent security solutions—Cloud App Security will work with security information and event management programs and data loss prevention programs already in use on your cloud to provide the highest-level protection without interrupting the workflow you are used to.