Gain visibility of cloud services in use and block risky apps to improve security
Cloud usage is continuing to expand as end users and departments become more comfortable acquiring cloud services. The typical organization is only aware of a small fraction of its overall cloud activity. The lack of a coordinated cloud enablement strategy leads to a broad set of productivity, expense, security, and support issues.
You need full visibility and risk information to manage cloud adoption in a secure and organized fashion. Once decisions are made about specific apps, you need the ability to block access to applications that are not approved to reduce the risk of sensitive data loss, account compromise and malware infection.
Visibility – see the cloud services that are being accessed from your various networks and managed devices.
App and risk insight – view details about each vendor and application including (business, usage and compliance) risk elements.
Optimization and blocking – ability to group apps by type, category, risk level, or number of requests to manage cloud adoption and help decide which apps to block. Automated blocking workflow to simplify administration.
The dashboard shows the level of cloud service activity and risk in your organization. It also provides a summary by app category that is sorted by risk level. This visibility can provide insight into potential policy and compliance violations if employees are using a new cloud service instead of an approved app.
Preset application level reports provide a list of apps with each label: Unreviewed, Under Audit, Approved and Not Approved. Filters can be easily applied to create custom views that help you understand and track use by category, usage, type, or status.
Utilize the 30 application categories to organize the apps in use and filter by risk level or number of requests to understand your current exposure. Then you can make informed decisions about categories and assign the individual apps to the “Approved”, “Under Audit” or “Not Approved” groups.
You can easily block the available apps by clicking on the link in the application listing or detail pages. This control can then be enforced for any network, group or individual user accessible by Umbrella policies.