Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Safetica Reviews & Ratings
    401 Ratings
    Company Website
  • Kasm Workspaces Reviews & Ratings
    125 Ratings
    Company Website
  • Orca Security Reviews & Ratings
    493 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    140 Ratings
    Company Website
  • UTunnel VPN and ZTNA Reviews & Ratings
    118 Ratings
    Company Website
  • Wiz Reviews & Ratings
    1,101 Ratings
    Company Website
  • Carbide Reviews & Ratings
    88 Ratings
    Company Website
  • phoenixNAP Reviews & Ratings
    6 Ratings
    Company Website
  • StackAI Reviews & Ratings
    47 Ratings
    Company Website
  • Windocks Reviews & Ratings
    7 Ratings
    Company Website

What is Forcepoint CASB?

Maximize the potential of cloud services for your business while ensuring that your data remains secure and under your control. By utilizing a Cloud Access Security Broker (CASB), you can efficiently oversee both sanctioned and unsanctioned cloud applications. Forcepoint CASB offers seamless integration with identity providers such as Ping and Okta, allowing you to build on existing frameworks you've established. If you haven't implemented an identity provider yet, the CASB can serve as a substitute, streamlining the addition of applications and enabling precise control over user access. Its intuitive interface is designed for easy navigation, ensuring that employees can use it without difficulty. While the risks posed by Shadow IT can leave sensitive data vulnerable, you can quickly pinpoint both managed and unmanaged cloud applications in real-time through your web proxy and firewall logs. Moreover, the cutting-edge Zero Trust Impossible Travel technology enables faster detection of compromised credentials by monitoring access patterns, locations, and timing from various devices. As data is transmitted to and from the cloud, and even between different cloud platforms, it is vital to protect it whether it is in transit or at rest. You have the ability to block data during transmission, encrypt or mask it, redact sensitive content, or apply watermarks for tracking purposes to ensure that your crucial information remains safe. Additionally, implementing proactive data protection strategies not only fortifies your security measures but also fosters a culture of trust within your organization, promoting a secure environment for collaboration and innovation.

What is Cisco Cloudlock?

A Cloud Access Security Broker (CASB) plays a crucial role in securing cloud users, data, and applications with ease. Cisco Cloudlock functions as an API-centric CASB aimed at promoting and accelerating the use of cloud services. By protecting identities, data, and applications, Cloudlock effectively mitigates challenges such as account takeovers, security lapses, and the various risks that come with the cloud application landscape. Its API-driven approach ensures a seamless and clear strategy that encourages responsible cloud adoption. Safeguard your organization from compromised accounts and internal risks with our User and Entity Behavior Analytics (UEBA), which evaluates a wide range of cross-platform activities to boost visibility and detection efforts. Additionally, prevent data leaks and security incidents with a highly adaptable data loss prevention engine that executes automated, policy-based responses. The Cloudlock Apps Firewall not only tracks and manages potentially dangerous cloud applications within your corporate infrastructure but also provides a community-sourced Trust Rating to evaluate the risk level of each application. Ultimately, Cisco Cloudlock delivers a solid foundation for securing cloud environments while fostering safe innovation and progress, ensuring that organizations can thrive in the digital landscape. This comprehensive solution empowers businesses to confidently embrace the cloud while maintaining robust security protocols.

Media

Media

Integrations Supported

1Kosmos
Active Directory
Acxiom Real Identity
Box
Cylera Platform
Digital Guardian
DoubleClue
Dropbox
Expel
F5 BIG-IP DDoS Hybrid Defender
Forcepoint ONE
IBM Datacap
IBM Verify
Imperva DDoS Protection
Imperva WAF
Okta
OneTrust Privacy Automation
RapidScale Identity as a Service
Salesforce
Scuba Database Vulnerability Scanner

Integrations Supported

1Kosmos
Active Directory
Acxiom Real Identity
Box
Cylera Platform
Digital Guardian
DoubleClue
Dropbox
Expel
F5 BIG-IP DDoS Hybrid Defender
Forcepoint ONE
IBM Datacap
IBM Verify
Imperva DDoS Protection
Imperva WAF
Okta
OneTrust Privacy Automation
RapidScale Identity as a Service
Salesforce
Scuba Database Vulnerability Scanner

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Forcepoint

Date Founded

1994

Company Location

United States

Company Website

www.forcepoint.com

Company Facts

Organization Name

Cisco

Date Founded

1984

Company Location

United States

Company Website

www.cisco.com/c/en/us/products/security/cloudlock/index.html

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Categories and Features

Popular Alternatives

Popular Alternatives

Check Point CloudGuard Reviews & Ratings

Check Point CloudGuard

Check Point Software Technologies
Censornet CASB Reviews & Ratings

Censornet CASB

Censornet
FortiCASB Reviews & Ratings

FortiCASB

Fortinet
FortiCASB Reviews & Ratings

FortiCASB

Fortinet