SOURCE: CloudLock

CloudLock

November 20, 2015 09:00 ET

CloudLock Announces Expanded CASB Solution for Microsoft Office 365 With Support of Microsoft Graph

CloudLock First and Only Solution to Provide Patented API-Based Support for Office 365

WALTHAM, MA--(Marketwired - Nov 20, 2015) - CloudLock, the leading provider of Cloud Access Security Brokerage (CASB) and Cybersecurity-as-a-Service solutions, today announced the only cloud-native API integration with the recently announced Microsoft Graph. Leveraging the APIs, data and intelligence exposed by Microsoft Graph, the expanded CloudLock for Office 365 security solution enables unified access to Microsoft Office 365 APIs with a single access token, streamlining development and improving developer productivity.

"We are once again honored to be a founding partner for another innovative Microsoft initiative as the Graph API," said Ron Zalkind, CTO and co-founder at CloudLock. "The time and effort Microsoft has put into building these great connectors that allow security organizations like CloudLock to integrate with is a game changer. As the growth and adoption of cloud applications continues to accelerate, these industry innovations open new opportunities for everyone and move forward our mission to make security a business enabler for organizations as they grow in the cloud."

CloudLock pioneered the API-first approach in the Cloud Access Security Broker (CASB) market with the patented and award-winning Cloud Security Fabric, the industry's first Cybersecurity-as-a-Service offering for SaaS, PaaS, IaaS, and IDaaS environments, as well as custom and homegrown apps and ISV offerings.

CloudLock's integration with Microsoft Graph provides a comprehensive view of activity across the entire Office 365 cloud environments, focusing on the following core capabilities:

User and Entity Behavioral Analytics (UEBA)

  • Detects suspicious activity indicative of account compromise, including suspicious logins, such as simultaneous or sequential sessions from geographically disparate areas
  • Provides geolocation visualizations of user activities across cloud applications, aggregating events across platforms for highly correlated security insight
  • Detects suspicious login events, including two-factor authentication failures, disabled account login failures, and impersonation events

Cloud DLP

  • Continuously monitors attachments and files in real-time
  • Provides out-of-the-box policy templates to surface instances of sensitive information (e.g., HIPAA, PCI, PII, regular expressions, IP, text) to safeguard critical assets
  • Quarantines excessively-exposed sensitive information through automated, policy-driven response actions

Cloud Malware

  • Discovery and mitigation of risk related to apps directly connected to sanctioned apps such as Office 365, Google Apps and others via OAuth with a clear strategic focus on apps that touch corporate data
  • Automated, policy-driven app control through app whitelisting and blacklisting based on risk profile and access scope based on CloudLock's community-based trust ratings

"CloudLock's mission to make security a business enabler is why they are an industry leader and avalued Office 365 partner," said Rob Lefferts, General Manager, Extensibility at Microsoft. "By using CloudLock alongside Microsoft Graph, organizations can take full advantage of the Office 365 platform while ensuring strong security, meeting compliance requirements, and combating cyber threats."

For more information about Microsoft Graph, visit https://graph.microsoft.io/.

Visit https://www.cloudlock.com/products/microsoft/ for more information about CloudLock for Office 365.

About CloudLock
CloudLock, the leading CASB and Cybersecurity-as-a-Service provider, offers the Cloud Security Fabric™ enabling enterprises to protect their data in the cloud, reduce risk, achieve compliance, manage threats and increase productivity by continuously monitoring and protecting more than one billion files for more than 10 million end users daily. CloudLock delivers the only complete, risk-appropriate and people-centric approach to cloud cybersecurity. Learn more at www.cloudlock.com.

Contact Information