Are you using or ready to deploy Microsoft Cloud App Security (MCAS)? While having CASB visibility and control is key to a good cloud app strategy, it is only as good as the traffic it can see. Zscaler and Microsoft have partnered to deliver key MCAS integrations that help you confidently embrace cloud apps and minimize the risks associated with unsanctioned apps.
5. On average, an organization has 28 cloud storage apps and
41 collaboration apps routinely used by its employees.
On-premises
6. But Office 365 Deployments are stuck in the slow lane!
A deployment survey of over 200 customers
had problems accessing
business-critical applications
including Office 365.
45%
Many were plagued by bandwidth
and network latency issues on a
daily and weekly basis
70%Weekly issues
reported
33%Daily issues
reported
Despite appliance upgrades, after deployment:
11. A comprehensive, intelligent security solution that brings visibility, real-time
controls and security to your cloud applications.
ControlDiscover Protect
Integrates with your SIEM, Identity and Access Management, DLP and Information Protection solutions
12. Discover and
assess risks
Protect your
information
Detect
threats
Control access
in real time
Identify cloud apps on your
network, gain visibility into shadow
IT, and get risk assessments and
ongoing analytics.
Get granular control over data
and use built-in or custom
policies for data sharing and
data loss prevention.
Identify high-risk usage and
detect unusual behavior using
Microsoft threat intelligence
and research.
Manage and limit cloud app
access based on conditions and
session context, including user
identity, device, and location.
101010101
010101010
101010101
01011010
10101
13. Get anomalous usage alerts, new app and
trending apps alerts.
On-going analytics
Discover 15K+ cloud apps in use across your
networks and sensitive data they store.
Discovery of cloud apps and data
Assess cloud app risk based on ~60 security and
compliance risk factors.
Cloud app risk assessment
Protect your employees’ privacy while discovering
cloud apps in your environment.
Log anonymization
Investigate cloud use profiles of specific users,
machines, apps and groups.
Advanced investigation tools
14. Control access to cloud apps as well as to
sensitive data within these apps based on user,
location, device, and app (any SAML-based
app, any OS).
Context-aware session policies
Limit activities performed within user sessions
in SaaS apps based on user identity, location,
device state, and detected sign-in risk level.
Unique integration with Azure Active Directory
Enforce browser-based “view only” mode for
low-trust sessions. Classify, label, and protect
on download. Gain visibility into unmanaged
device activity.
Investigate & enforce app and data restrictions
15. Set granular policies to control data in the
cloud—either automated or based on file
label—using out-of-the-box policies or ones
you customize.
Granular Data loss prevention (DLP) policies
Control and protect sensitive files through
policies and governance to comply with
regulations (e.g., GDPR, HIPAA, PCI, SOX).
Compliance policies
Identify policy violations, enforce actions such
as quarantine and permissions removal.
Policy enforcement
Apply protection, including encryption and
classification, to files with sensitive
information
Native protection – at rest and inline
16. User manually classifies a file in Office apps,
Cloud App Security reads classification from the
file to give admins visibility to cloud activities on
this data: Upload, sharing & download.
Sharing control based on user input
Proxy automatically encrypts files labeled as
“internal” upon download to non-corporate
owned devices
Prevent corporate data leakage based on
classification
17. Assess risk in each transaction and identify
anomalies in your cloud environment that may
indicate a breach.
Behavioral analytics
Enhance behavioral analytics with insights
from the Microsoft Intelligent Security
Graph to identify anomalies and attacks.
Threat intelligence
Customize detections based on your findings.
Customization
Gain useful insights from user, file, activity, and
location logs. Pivot on users, file, activities and
locations.
Advanced investigation & multiple views
Remediate threats and security issues
with a single click.
Single-click remediation
18. Why Cloud App Security is different
Discover SaaS apps & assess risk
Identify more than 15,000 apps and assess their
risk based on 60 different parameters, including
regulatory compliance.
Gain unified information protection
Set granular control policies and enforce them
on your cloud apps and data—whether from
Microsoft or other vendors—using powerful
remediation actions.
Control and limit access in real time
Set granular access- and activity-level policies,
such as allowing access from an unmanaged
device while blocking downloads of sensitive
data.
Support your compliance
journey with key regulations
Discover and control data in the cloud with
granular policies to help you comply with
regulations such as Payment Card Industry (PCI)
and General Data Protection Regulation (GDPR).
Detect & mitigate ransomware attacks
Identify potential ransomware activity with a
built-in template that can search for unique file
extensions, suspend suspect users, and prevent
further encryption of user files.
Integrate with your existing
SIEM & DLP solutions
Preserve your usual workflow and set a
consistent policy across on-premises and cloud
activities while automating security procedures.
As users moved out side corporate networks and applications moved out of data center into SaaS and IaaS platforms, Internet became your corporate network. By 2020, many progressive CIOs like at Siemens and GE will adapt Internet as corporate network and start getting rid of the whole DMZ or corporate ‘moat and castles’ they have built since 1990s.
“We are the perfect complement”
We are the Ying and the Yang.
Riverbed provides the SD WAN to allow local internet breakout and banch internet offload, which Zscaler secures the new perimeter i.e. Internet with its 100+ data centers.
Purpose of slide: Describe Cloud App Security at a high level
Key takeaways
Microsoft Cloud App Security is a comprehensive service providing deep visibility, granular controls and enhanced threat protection for your cloud apps.
It identifies 14,000+ cloud applications in your network—from all devices—and provides ongoing risk assessment and analytics.
No agents required: information is collected from your firewalls and proxies to give you complete visibility and context for cloud usage and shadow IT.
Purpose of slide: Describe integration of Cloud App Security and Azure Information Protection
Key takeaways
Through integration with Azure Information Protection, you can use the Cloud App Security portal to set policies for files sharing – based on their level of sensitivity to the business as set by Azure Information Protection.
Integration of Azure Information Protection and Cloud App Security extends visibility into sensitive data at it moves to cloud locations. Cloud App Security admins can configure policies to read Azure Information Protection labels and take appropriate actions or raise alerts.
When there is a violation against your policies, you will receive an alert.
After you have thoroughly investigated and learned about this violation, you can use governance actions to protect your data in the cloud apps right away. Every insight is actionable, allowing you to remediate with a single click or implement data sharing and granular usage policies. For instance, you can:
Put files into quarantine so only user can access the file
Restrict sharing (i.e. make a link private)
Send notifications to users who shared these sensitive files
Purpose of slide: Describe how Cloud App Security assists with threat detection
Key takeaways
In addition to the capabilities we outlined earlier, Cloud App Security helps you to protect your data in cloud apps from cybersecurity threats. You can identify anomalies in your cloud usage that may be indicative of a data breach.
Cloud App Security advanced machine learning heuristics learn how each user interacts with each SaaS application and, through behavioral analysis, assesses the risks in each transaction.
This includes simultaneous logins from two countries, the sudden download of terabytes of data, or multiple failed login attempts that may signify a brute force attack.
Anomaly detection draws from Microsoft’s vast amount of threat intelligence and security research data.
Cloud App Security benefits from Microsoft’s holistic, agile security platform, and is informed by insights from Microsoft Intelligent Security Graph.