List of Proofpoint Cloud App Security Broker (CASB) Integrations

This is a list of platforms and tools that integrate with Proofpoint Cloud App Security Broker (CASB). This list is updated as of November 2025.

  • 1
    Leader badge
    Microsoft 365 Reviews & Ratings

    Microsoft 365

    Microsoft

    Empower your productivity with seamless tools and collaboration.
    Microsoft 365 for Individuals is a powerful ecosystem that blends AI innovation, productivity, and creativity into one cohesive experience. With familiar tools like Word, Excel, PowerPoint, Outlook, and OneNote enhanced by Copilot AI, users can draft, analyze, and organize tasks with unprecedented ease. Microsoft’s AI integration helps users overcome creative blocks, turn ideas into polished designs, and work more efficiently across every device. Through OneDrive’s 1TB of cloud storage per person, all files, photos, and documents remain secure and accessible from anywhere. Microsoft Designer and Clipchamp enable users to create visually stunning content and edit videos with professional precision, all without needing advanced design skills. The addition of Microsoft Defender ensures that privacy and cybersecurity remain at the forefront, protecting devices and personal data. Each plan—from Basic to Premium—offers flexibility to match different lifestyles and budgets while maintaining access to the full suite of AI-powered tools. With support for multiple devices, family sharing options, and real-time collaboration, Microsoft 365 connects people across home, work, and learning environments. Copilot AI personalizes productivity by offering insights, summaries, and creative suggestions that evolve with user habits. Altogether, Microsoft 365 redefines how individuals create, communicate, and manage their lives in a connected digital world.
  • 2
    Leader badge
    Box Reviews & Ratings

    Box

    Box

    Intelligent content management, secure collaboration, and automated workflows
    Store, sign, and secure your documents on Box, the leading Intelligent Content Management platform. Built for the AI-first era, Box simplifies your tech stack and conserves cost with one secure, end-to-end solution for the entire content lifecycle.
  • 3
    Leader badge
    Google Workspace Reviews & Ratings

    Google Workspace

    Google

    Transform teamwork and productivity with an intuitive platform.
    Google Workspace, an upgraded iteration of G Suite, consolidates all the vital tools necessary for enhancing productivity within a single, intuitive platform. This cohesive workspace streamlines your workflow, enabling you to concentrate more on completing your tasks rather than managing them. With cutting-edge AI and search functionalities, Google Workspace empowers you to prioritize what is most important while it handles the rest. You can collaborate effortlessly from any location and on any device, even offline, thanks to customizable features tailored to meet your team’s unique needs. Similar to G Suite, Google Workspace provides personalized email solutions for businesses alongside a range of collaborative tools such as Gmail, Calendar, Meet, Chat, Drive, Docs, Sheets, Slides, and Forms. Discover our variety of plans designed to meet your specific business requirements, and choose the one that best fits your objectives on our pricing page. By adopting Google Workspace, you will witness a significant transformation in how your team collaborates and achieves its goals, ultimately leading to greater success. Embrace this opportunity to elevate your teamwork and productivity to new heights.
  • 4
    Sherweb Reviews & Ratings

    Sherweb

    Sherweb

    Empower your online business with secure, innovative cloud solutions.
    Discover a reliable and secure solution specifically designed for the needs of your online enterprise. All the essentials you require to launch your business are readily accessible. Benefit from an intuitive control panel that simplifies the management of your website. Our experienced support team is always on hand to provide assistance whenever you need it. Additionally, you will have access to a vast collection of pre-configured web applications that are ideal for enhancing your site. By choosing to collaborate with Sherweb, your trusted partner in the cloud, you will be pleasantly surprised by the opportunities that await. Our all-encompassing cloud management platform is crafted to meet the evolving demands of businesses, empowering IT professionals to leverage adaptable solutions backed by top-notch service from dependable experts. With a strong focus on cloud technology, IT professionals can feel confident knowing that our ever-expanding range of innovative offerings has been meticulously selected and vetted, featuring exclusive proprietary software that cannot be found elsewhere. We deliver a solid and sophisticated platform that seamlessly balances time efficiency with savings on costs. In addition, you can streamline and connect almost any process by utilizing our cutting-edge APIs, which guarantees that your operations are both productive and effective. When you partner with Sherweb, the horizon for your online business is not only bright but also brimming with incredible possibilities for growth and success. Embrace the future and let us help you navigate your journey ahead.
  • 5
    Saasment Reviews & Ratings

    Saasment

    Saasment

    Empowering your business with comprehensive, proactive security solutions.
    Saasment tackles security weaknesses to reduce the likelihood of human errors in the oversight of digital assets. We enhance security measures to effectively protect your company's confidential data. Our offerings feature fraud prevention and extensive defenses against new threats that particularly affect e-commerce systems like Shopify and Wix. By utilizing our automated cloud Chief Information Security Officer (CISO) services, you can focus on growing your business while securing essential partnerships. We assist in identifying potential risks, allowing you to understand the security shortcomings within your cloud and SaaS applications. This knowledge enables you to formulate a customized security plan that corresponds with the risks identified in your operational environment. After the strategy is crafted, we support you in deploying the essential solutions, elevating your business to achieve superior security through our SaaS security platform. Our dedication includes continuous monitoring to ensure that your organization is free from vulnerabilities and threats. Furthermore, we aid businesses in detecting and correcting misconfigurations across more than 40 applications, while also ensuring continuous compliance tracking to maintain regulatory standards. By collaborating with us, you can establish a robust security framework that adapts alongside the evolving requirements of your business. This proactive approach not only enhances your security posture but also fosters a culture of vigilance within your organization.
  • 6
    Imperva CDN Reviews & Ratings

    Imperva CDN

    Imperva

    Secure your global presence with optimized performance and protection.
    Expanding your websites and applications to a global audience can heighten the potential for cyber threats and fraudulent activities, which underscores the importance of having strong security measures in place. The Imperva Content Delivery Network (CDN) features essential components such as content caching, load balancing, and failover capabilities, all integrated into a comprehensive Web Application and API Protection (WAAP) platform, which guarantees secure access to your applications across the globe. Utilizing machine learning to manage the workload optimizes the caching of dynamically generated pages while ensuring that content remains up-to-date. This strategy not only boosts the efficiency of caching but also significantly reduces bandwidth usage. By employing a variety of content and networking optimization techniques, you can accelerate page rendering times and improve the overall user experience. Additionally, Imperva's cutting-edge global CDN uses advanced caching and optimization techniques to enhance both connection and response times while simultaneously lowering bandwidth costs. The result of these combined features is a more robust and efficient online presence that can adapt to the demands of a global market. Ultimately, this holistic approach creates a more secure and user-friendly environment for online interactions.
  • 7
    Imperva WAF Reviews & Ratings

    Imperva WAF

    Imperva

    Unmatched protection against web threats, ensuring seamless operations.
    Web application attacks pose significant threats by disrupting essential transactions and exposing sensitive data. The Imperva Web Application Firewall (WAF) plays a critical role in scrutinizing incoming traffic to your applications, effectively preventing these attacks and ensuring smooth business operations. Organizations often face a dilemma when a malfunctioning WAF forces them to choose between blocking legitimate traffic or dealing with the attacks that evade detection. To address this issue, Imperva Research Labs continually refines the WAF's accuracy to adapt to new and evolving threats. With capabilities such as automatic policy creation and rapid rule adjustments, security teams can confidently integrate third-party code while keeping pace with the dynamic demands of DevOps. As a vital component of a comprehensive Web Application and API Protection (WAAP) strategy, Imperva WAF secures every layer of your infrastructure, ensuring that only the intended traffic is allowed access to your applications. Our industry-leading solution provides unparalleled website protection, adhering to PCI compliance, featuring automated security enhancements with in-depth analytics, and offering superior defenses that go beyond the OWASP Top 10, ultimately reducing the risks tied to third-party integrations. By implementing Imperva WAF, your organization can effectively traverse the complexities of the digital realm, maintaining robust security without sacrificing operational efficiency. This proactive approach not only enhances your overall security posture but also fosters trust among users, enabling sustained growth and innovation.
  • 8
    Imperva DDoS Protection Reviews & Ratings

    Imperva DDoS Protection

    Imperva

    "Uninterrupted security for your online assets, always vigilant."
    Imperva's DDoS Protection ensures that all your digital assets are safeguarded at the network edge, allowing for uninterrupted operations. This service helps maintain business continuity by guaranteeing uptime, which is essential since it only takes moments for an organization to go offline, but recovery can be a lengthy process; therefore, every second counts during an attack. With Imperva, you gain peace of mind as it automatically filters out malicious traffic at the edge, which prevents the need for costly bandwidth increases. Specifically tailored for websites, the DDoS Protection service is always active, providing rapid responses to any type or scale of DDoS attack that targets your web applications. This service collaborates with Imperva's cloud web application firewall (WAF) to effectively thwart hacking attempts and bot attacks. A straightforward adjustment to your DNS records routes all HTTP/S traffic for your domain(s) through the Imperva network, ensuring secure handling. Acting as a protective proxy, Imperva’s DDoS protection hides the IP address of your origin server, adding an extra layer of defense against potential threats. By deploying this comprehensive solution, organizations can focus on their primary operations without the ongoing anxiety of DDoS attacks interfering with their services, ultimately fostering a more secure digital environment. This level of protection not only enhances operational efficiency but also strengthens customer trust in your online presence.
  • 9
    Scuba Database Vulnerability Scanner Reviews & Ratings

    Scuba Database Vulnerability Scanner

    Imperva

    Uncover hidden threats and secure your databases effortlessly!
    Meet Scuba, a free vulnerability scanner designed to unearth hidden security threats lurking in enterprise databases. This innovative tool enables users to perform scans that uncover vulnerabilities and misconfigurations, shedding light on potential risks associated with their databases. In addition, it provides practical recommendations to rectify any identified problems. Scuba supports a wide range of operating systems, including Windows, Mac, and both x32 and x64 editions of Linux, featuring an extensive library of more than 2,300 assessment tests specifically crafted for major database systems such as Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2, and MySQL. With Scuba, users can effectively pinpoint and assess security vulnerabilities and configuration issues, including patch levels, ensuring their databases remain secure. The scanning process is user-friendly and can be started from any compatible client, typically taking only 2-3 minutes to complete, although this may vary based on the database's complexity, the number of users and groups, and the quality of the network connection. Best of all, users can dive into Scuba without the need for prior installation or any additional dependencies, making it an accessible choice for database security assessment. This ease of access allows organizations to prioritize their security needs without unnecessary delays.
  • 10
    Abstract Security Reviews & Ratings

    Abstract Security

    Abstract Security

    Empower your security teams with streamlined, AI-driven insights.
    Rescue your security teams from the overwhelming flood of noise and complications! Abstract enables them to concentrate on essential tasks without the concerns of vendor lock-ins, SIEM migration expenses, or sacrificing speedy access for storage needs. By utilizing Abstract Security, an AI-powered security data management platform, organizations can optimize their data processes through noise minimization, AI-driven normalization, and sophisticated threat analytics conducted on live data streams, allowing for timely insights before directing the information to any storage solution. This approach not only enhances operational efficiency but also empowers teams to respond to threats more effectively.
  • 11
    SmartShare Reviews & Ratings

    SmartShare

    EASI

    Empower your team with seamless collaboration and efficiency.
    SmartShare, an adaptable Collaboration Suite tailored for high-performing teams, centralizes crucial updates into a single platform for easy access and management. Its acclaimed Company Overview feature delivers a complete view of customer-related data on one screen, showcasing active projects, deals, contracts, and offerings. By improving the organizational framework, SmartShare facilitates better collaboration and data sharing among team members. The centralization of information translates into enhanced teamwork across departments, resulting in customer feedback that highlights an average time savings of one hour per employee each day. A sophisticated system for managing access rights ensures that sensitive data remains secure while being available only to authorized users. Permissions can be adjusted at multiple levels—individual, team, binder, project, and document—allowing for both flexibility and security. Additionally, the integration of email management into the shared workspace significantly elevates productivity and encourages effective collaboration among team members. This forward-thinking strategy not only streamlines communication but also optimizes the overall workflow, ultimately contributing to a more efficient and productive work environment. By harnessing the power of technology, SmartShare empowers teams to reach their full potential.
  • 12
    Panaseer Reviews & Ratings

    Panaseer

    Panaseer

    Elevate your security posture with automated, continuous insights.
    Panaseer's continuous control monitoring platform serves as a robust solution for overseeing every facet of your organization. It delivers reliable, automated insights regarding the organization's security and risk posture. By establishing a comprehensive inventory of all organizational elements—such as devices, applications, personnel, accounts, and databases—the platform pinpoints assets that may be absent from various sources and highlights potential security vulnerabilities. Furthermore, it offers valuable metrics and assessments to help you comprehend your compliance and security standing at all levels. The platform is capable of processing data from any source, whether it's cloud-based or on-premises, allowing for flexibility in data integration. Users can easily access this information across security, IT, and business domains through readily available data connectors. By employing entity resolution techniques, the platform effectively cleans, normalizes, aggregates, and de-duplicates the data, resulting in a continuous stream of insights regarding unified assets and controls across devices, applications, personnel, databases, and accounts. This ensures that organizations can maintain a proactive approach to their security and compliance needs.
  • 13
    Elevate Security Reviews & Ratings

    Elevate Security

    Elevate Security

    Transform your security culture with targeted, adaptive risk management.
    Pinpointing users and their behaviors that are prone to security breaches is crucial, necessitating the adoption of tailored policies and controls to mitigate such risks. By delivering focused and actionable feedback to both staff and management, companies can improve their security frameworks significantly. Identifying individuals who may be more susceptible to causing breaches enables organizations to proactively develop specific policies and interventions, which effectively curtail risks. The Elevate Security platform supports security teams by automating the necessary controls to reduce threats, avert breaches, and encourage informed security practices without imposing excessive obstacles. Through the intelligent and adaptive management of the human attack surface via Human Risk Scores, organizations can automate critical interventions rather than depending on broad, less effective measures. It is vital to tailor communication strategies to reflect individual behaviors and established policies, ensuring that the effectiveness of certain measures is clearly conveyed. Furthermore, businesses should regularly evaluate which controls are productive and which are ineffective while personalizing response strategies for all levels of personnel, from entry-level employees to top executives, to create a thorough security strategy. This comprehensive approach not only bolsters the organization's security infrastructure but also cultivates a culture of responsibility and vigilance across all teams, ultimately leading to a safer operational environment. By fostering an ongoing dialogue about security practices, organizations can ensure that every employee feels empowered to contribute to the overall security goals.
  • 14
    Product Marketing Alliance Reviews & Ratings

    Product Marketing Alliance

    Product Marketing Alliance

    Empower your product marketing journey with unmatched resources.
    PMA establishes a new standard for excellence, empowering product marketers to enhance their product offerings and organizational impact. Our membership plans offer a wealth of resources, including templates, frameworks, exclusive content, over 200 hours of PMM presentations, and mentorship from industry veterans, ensuring you have the essential tools for both product and career advancement. The Product Marketing Core includes everything a product marketer needs to elevate their product and professional trajectory, featuring 11 detailed modules, over 20 templates, an official certification, and engaging live sessions created in partnership with PMMs from renowned companies like HubSpot, Google, and Facebook. We are committed to our mission: to elevate the importance of product marketing, a goal we are successfully achieving as we broaden our influence. Furthermore, for those looking to boost their brand visibility and connect with a vibrant community of PMMs interested in valuable offerings, our sponsorship opportunities serve as an excellent avenue for growth and collaboration. This holistic approach not only fosters individual success but also contributes to the overall advancement of the product marketing field.
  • 15
    Prominic.NET Reviews & Ratings

    Prominic.NET

    Prominic.NET

    Empower your data with bespoke, secure cloud solutions.
    We offer state-of-the-art private and managed cloud solutions that guarantee you complete visibility and control over your data. Our cloud-hosted virtual servers and desktops utilize VMware's leading virtualization platform designed for enterprises. If your organization is in need of improved security, dependability, and specialized support for your WordPress hosting, you've arrived at the ideal solution. Prominic’s fully managed private cloud operates like your own on-site data center, while also providing the advantages of cloud technology. You retain total authority over your environment, and our support team works in harmony with your IT staff. Are you concerned about protecting your confidential information away from company laptops while keeping centralized oversight of security and applications across all devices? Virtual Desktop Infrastructure (VDI) could be the answer you’re looking for. We provide a single-tenant, customizable infrastructure designed to meet your specific needs. With our services, you can rest assured about the location of your data and who has access to it, promoting peace of mind in today's digital landscape. Our dedication to transparency and empowering our clients distinguishes us in the cloud services industry, ensuring you can trust us with your critical operations. Furthermore, we prioritize your unique requirements, adapting our solutions to provide the most effective service possible.
  • 16
    Akitra Andromeda Reviews & Ratings

    Akitra Andromeda

    Akitra

    Streamline compliance effortlessly with cutting-edge AI automation.
    Akitra Andromeda is an innovative platform that utilizes artificial intelligence to automate compliance processes, making it easier for businesses of all sizes to adhere to various regulatory requirements. It supports a diverse array of compliance frameworks, including SOC 2, ISO 27001, HIPAA, PCI DSS, SOC 1, GDPR, and NIST 800-53, as well as custom frameworks, enabling organizations to achieve and maintain compliance seamlessly. With over 240 integrations with leading cloud services and SaaS providers, Akitra integrates effortlessly into existing workflows, enhancing operational efficiency. The platform also utilizes automation to significantly reduce the time and costs associated with traditional compliance management by automating vital tasks such as monitoring and evidence collection. Moreover, it offers a comprehensive library of policy and control templates to assist organizations in crafting effective compliance strategies. Continuous monitoring features ensure that businesses' assets remain secure and compliant, alleviating concerns associated with navigating regulatory complexities. Ultimately, Akitra Andromeda emerges as an indispensable resource for contemporary organizations aiming to excel in compliance management while fostering a culture of accountability and diligence. In an era where compliance is increasingly paramount, Akitra's capabilities position it as an essential partner for businesses committed to regulatory excellence.
  • Previous
  • You're on page 1
  • Next