Académique Documents
Professionnel Documents
Culture Documents
Secure use of
cloud apps & services
CASB
API
Web
IaaS
SaaS
API-based
Securlets™
72
Mobile /
IoT
Threat Protection
CASB
Identifies high risk user behavior and
Audit controls threats in cloud apps.
Symantec Symantec
VIP ProxySG/WSS
Incident Response
Quickly investigate areas of
concern in cloud accounts with
Better rich log-based intelligence.
Together
Integrate CASB with
the rest of your
Symantec enterprise security Symantec
MSS DLP
Symantec Symantec
SEP ATP
Symantec
PGP
© 2017 Symantec Corp. All rights reserved
4
An Integrated
Security System
SITUATION
Cloud services make it easy to collaborate.
They also make it easy to expose or lose sensitive,
confidential, or compliance-related data. A typical
organization broadly shares more than 20% of files
in cloud apps—either to the public, to the entire
Classify and track organization or to an external party.1 Some of these
compliance-related files will contain confidential data.
and confidential data
such as PII, PHI, source
code, legal, health, and SOLUTION
more automatically
Prevent Data Loss in the Cloud with CloudSOC
by identifying sensitive data, monitoring data at risk,
Identify users
associated with encrypting sensitive content, and enforcing policy
sensitive data at risk controls to prevent data breach.
1
Source: 2H 2016 Shadow Data Report, Symantec
CASB Overview Cloud Access Security Broker 7
SOLUTION
Protect your organization from threats in
cloud account with controls based on data
Detect malicious user
activity in context with science powered User Behavior Analytics (UBA)
one or more cloud apps and integrated malware protection.
An Integrated
Security System
Activity Logs 10,287 matching logs 1 Month Mar 22, 2015 - Apr 20, 2015
Incident Investigate
Response
and respond
to incidents
with CloudSOC
SITUATION
Security incidents happen.
The more you know about your activity in the cloud,
the more you can do to protect your organization.
SOLUTION
Quickly investigate areas of concern
with rich log-based intelligence.
The Investigate function makes the intelligence
of CloudSOC accessible to you through easily
Leverage granular
insights into cloud searched and filtered logs documenting cloud
activity for post- transactions based on users, files, apps, actions,
incident analysis
and more. Investigate presents data graphically
for fast analysis and offers consolidated summary
Quickly find critical
information with free- logs for an instant review of relevant activity.
form search, extensive
filters and pivot tables
Search
Investigate MediaFire
Amazon Web Services
1702
977
File
Session
1354
1048
error
critical
816
175
Chrome
PhantomJS
3462
17
2500
2000 Activity Logs 10,287 matching logs 1 Month Mar 22, 2015 - Apr 20, 2015
Summary Services Users Destinations
1500
2500
1000
2000
500
63
1500
70 % 40 Services
at medium or higher risk
1000
1 Assembla
Collaboration, Project Management
80 1,158
Users
Google Mail
Email
Export as: CEF CSV LEEF
Severity Message
Google Mail
953
Top Users View all
Elastica
[ALERT] arline.singh@company.com attempted
2
arline.singh@company.com | Apr 20, 2015, 6:07:30 PM | critical
82
to download content:”amazon zocalo.png” violating policy:”FT_ConfidentialContent”
Email
Users
Unsanctioned
[ALERT] arline.singh@company.com attempted to download content:”amazon zocalo.png” violating policy:”FT_ConfidentialContent” anon-user.1165944 146 11
Box Sessions MB
arline.singh@company.com | Apr 20, 2015, 6:07:24 PM | critical
GitHub 949
Box
User downloaded “Team Contacts.xlsx”3
Graham Klosterman | Apr 20, 2015, 5:40:47 PMCode Hosting
| informational
72 Users anon-user.1165980 37 3
Sessions MB
User shared “recap.txt” width “carol.bell@company.com”
Box
Wendy Humber | Apr 20, 2015, 5:40:47 PM | informational 56 3
Assembla anon-user.1165962
890 Sessions MB
Access Box 60
[ALERT] harvey.nair@company.com attempted
4 Collaboration, Project Management
to share content:”recap.txt”
harvey.nair@company.com | Apr 20, 2015, 5:32:20 PM | critical
35
with external user “rosie.wang@externalcompany.com”
Users
New’15
Administrative 66 52 2
User obtained the link of “recap.txt” and shared with People with the link anon-user.1165969
Box Sessions MB
Business Harvey Nair | Apr 20,90
2015, 5:32:11 PM | informational
Sourceforge 822
Compliance
Box
47
[ALERT] brad.yamada@company.com 5
attempted 55
to share content:”recap.txt” with external user “vanessa.castillo@externalcompany.
Development Users anon-user.1165961 114 2
brad.yamada@company.com | Apr 20, 2015, 5:31:52 PM | critical Sessions MB
Data 73
[ALERT] brad.yamada@company.com attempted to share content:”recap.txt” with external user “vanessa.castillo@externalcompany.
Box
brad.yamada@company.com | Apr 20, 2015, 5:31:36 PM | critical
User obtained the link of “recap.txt” and shared with People with the link
Box
Harvey Nair | Apr 20, 2015, 5:31:43 PM | informational
An Integrated
Security System
integrates with the rest of your enterprise security. cloud applications and services
while staying safe, secure and
compliant. A range of capabili-
ties on the CloudSOC platform
deliver the full life cycle of cloud
application security, including
auditing of shadow IT, real-time
detection of intrusions and threats,
protection against data loss
and compliance violations, and
investigation of historical account
activity for post-incident analysis.
integrations
USER WEB
AUTHENTICATION SECURITY
About
MANAGED
CLOUD SECURITY
(CASB) DATA LOSS
Symantec
SECURITY SERVICE PREVENTION
symantec.com +
1 650-527-8000
Copyright © 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo, are trademarks or registered trademarks of Symantec
Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes
only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent
allowed by law, and are subject to change without notice.