Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Software

Hall 9 / Booth Number 9-210

Proofpoint Cloud App Security Broker

Key Facts

  • Adaptive access controls for cloud apps
  • Discover cloud apps and contain shadow IT, including third-party OAuth apps
  • Install in days and achieve actionable results in less than four weeks

Product Description

Proofpoint Cloud App Security Broker (Proofpoint CASB) takes a people-centric approach to protect your users from cloud threats and safeguard your sensitive data. It also helps you discover shadow IT and govern cloud and third-party OAuth apps. Cloud security starts with safeguarding IT-approved apps that contain your most valuable data. These include Microsoft 365 (Office 365), Google G Suite, Salesforce, Box and others. But that is not enough. You need an integrated, people-centric approach that correlates threats and applies consistent data loss prevention (DLP) policies across your email and cloud apps. Proofpoint CASB protects you from account compromise, oversharing of data, misconfiguration of IaaS and PaaS resources, and compliance risks. Our agentless solution gives you people-centric visibility into threats, adaptive access control, automated response and comprehensive data security with DLP. It also delivers cloud and third-party app governance, including cloud security posture management. KEY BENEFITS • Protect cloud users with people-centric threat visibility and adaptive access controls for cloud apps • Shorten time to discover and protect regulated cloud data with out-of-the-box DLP policies • Protect sensitive data and simplify operations with accurate DLP unified across the top two data loss vectors—cloud apps and email • Discover cloud apps and contain shadow IT, including third-party OAuth apps • Find IaaS accounts and resources, monitor accounts for suspicious activity and manage cloud security posture • Install in days and achieve actionable results in less than four weeks
... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.