See a list of supported network devices here: (TechNet.10).aspx By ingesting traffic logs into Cloud App Security you’ll gain visibility of cloud application and data usage. Cloud App Security offers a method to manually or automatically (via log collectors), import traffic logs from network devices. Most organizations I speak with want to know who’s using what cloud applications and how much corporate data is being stored in sanctioned and unsanctioned cloud applications. On the left we see apps that are sanctioned and threat detections (I’ll cover this later in the post). Select any of the items to drill down for more information. The dashboard provides an overview of activities, alerts, and violations. Once the Cloud App Security subscription is live, login to the admin portal and get a feel for the interface.Ī fresh Cloud App Security interface won’t have any data in it, however mine does, as shown below: Simply logon or start a trial of Office 365 and enable a trial of Cloud App Security from the O365 admin tenant. However, with Cloud App Security setting it up is straight forward. All things that require time and money to implement. In the past, setting up security solutions required hardware and software, firewall configuration, etc. The architecture of Cloud App Security is shown in the image below: With tools to help uncover Shadow IT, assess risk, enforce policies, investigate activities and stop threats, organizations can safely move to the cloud while maintaining control of critical data. It also increases protection of critical data across cloud applications. It is a comprehensive solution that helps organizations take full advantage of the promise of cloud applications while maintaining control with improved visibility into activity. Cloud App Security is designed to help you extend the visibility, auditing, and control you have on-premises to your cloud applications.Ĭloud App Security is a critical component of the Microsoft Cloud Security stack. Microsoft Cloud App Security is a comprehensive service that provides deeper visibility, comprehensive controls, and improved protection for your cloud applications. However, with Microsoft Cloud App Security you don’t have to give up control or visibility into SaaS based services anymore. If you’re like me, those questions are top of mine when create a new cloud subscription and giving up control is sometimes difficult to do. Have you ever wondered what is going on within the SaaS services your organization is using?Īre you curious about what unsanctioned SaaS apps employees may be storing company data in?ĭo you want to know where and when sensitive data is stored in the cloud?ĭo you want to know who’s accessing sensitive data in the cloud?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |