Inadequate visibility into activity in cloud applications – both sanctioned and unsanctioned | Gained understanding of both sanctioned and unsanctioned apps, rated them according to customers’ security risk, and selected those that conform to their risk tolerance. | Maximises cloud security by monitoring cloud activity. |
Inability to enforce security policies on enterprise cloud services | Extended the reach of customers’ on-prem security policies to the cloud. | Ensures compliance and data privacy. |
Lack of integration with other security tools and solutions | Extended coverage of on-prem DLP to the cloud | Identifies data loss channels in the organisation. |
Inability to identify risky users | Helped organisation in identifying risky user behaviour such as data exfiltration and file oversharing | Analyses and disables accounts indicating malicious activity. |
No defined implementation roadmap for CASB technologies. |
- Developed use cases and requirements for CASB solution.
- Performed vendor analysis.
- Developed a detailed implementation plan including high-level architectural diagram.
- Implemented the CASB solution.
| Ensures the secure and compliant use of cloud apps and services. |