Security Intelligence Platform for Cloud Services in our data-driven age.



Henceforth, Enterprises, developers, governments and organizations are looking to or already harness in real-time and anywhere the flexibility, agility and productivity offered by cloud services.

Connectikpeople.co encourages this momentum, but recalls that Security Intelligence Platform for Cloud Services in our data-driven age should consider or deliver inter alia the following holistic capabilities:
  • Behavioral Analytics: Identifies and prevents data loss from compromised accounts and insider threats, driven by anomalies that take into account the context of the user (e.g. role and reputation), application, data, action, device, and location.
  • Privileged User Analytics: Monitors all privileged user activities including escalation of privileges, user provisioning, and unauthorized use for audit and compliance purposes.
  • Sensitive Data Analytics: Provides a detailed and continuous view of all sensitive data (such as PII, PHI or corporate IP) stored in these systems, where the data is located, who is accessing it, and DLP violations based on the enterprise’s policies.
  • Connected Apps Analytics: Discovers all third-party applications connected to these services, assesses the risk of these applications, and monitors all data moving to these applications.
  • Collaboration Analytics: Identifies the size, scope, and relevance of all third parties (customers, suppliers, partners) collaborating with the enterprise, assesses the risks of partners, monitors data accessed by partners, and reports on all exceptions to collaboration policies.
  • Security Policy Analytics: Discovers the current settings for all security configurations and suggests modifications to improve security based on industry best practices.
  • Alerting, Reporting and Remediation: Delivers real-time alerts, integrates with existing SIEMs, provides drill down capability for forensics and investigations, and enables policy-driven remediation (e.g. block, quarantine, encrypt, force two-factor authentication).
For informational purpose only, Connectikpeople.co recalls that Skyhigh Networks, can help enterprises safely adopt cloud services while meeting their security, compliance, and governance requirements.

Popular Posts