The new cloud-based solution empowers organisations to monitor and control the use of both web and cloud applications from a single management dashboard, and uses authentication technology to help administrators safeguard access to the service. CensorNet USS enables organisations to simultaneously protect employees against cyber-threats, accidental or intentional leaks of sensitive data, and also keep the business safe from the risks associated with cloud applications and Shadow IT.
As new technologies emerge, cybercriminals continue to look for new weaknesses to exploit. With the exponential rise of cloud applications in today’s digital workplace, organisations now need a 360 degree view of all data flow across all communications channels, regardless of where users access the data from or from what devices.
“Our vision is to provide organisations with the ability to correlate events across web, cloud applications, authentication and email through a single centralised management dashboard. By monitoring the data flow across these different channels, CensorNet USS is able to mine vast amounts of data and identify exactly who did what, where and when, and with which application. Organisations can easily pick up an analytical audit trail of what is happening in the event of a threat and swiftly act upon it,” explains Ed Macnair, CEO, CensorNet. “USS has been designed to address today’s cybersecurity challenges, which continue to evolve beyond the capability of legacy information security technologies. Technology by definition should be intelligent, progressive and forward thinking and USS is the embodiment of that very ethos.”
CensorNet was the first to market with a secure web gateway with in-built cloud application control to bridge the gap between traditional web security and cloud application control, providing organisations with full real-time visibility and control of all aspects of web access and cloud application use across all devices in a single solution. The company is building on the success of its on-premise web security with inbuilt cloud application control by moving the solution to the cloud.
New features include policies to control cloud application use that can be set at a granular level based on the individual or role, the device being used, the network connected to, specific functions within the application and the location of the user. For example, someone can have ‘view only’ access to an application that includes sensitive data when they are using a tablet in an airport, but are able to download or print that information when at their desktop and connected to the corporate network. These policies are enforced even when users attempt to circumvent controls by using anonymising proxy sites.
Garrett Bekker, Senior Analyst at 451 Research comments: “Enterprises can derive more value from security when they can see the complete, bigger picture. While web and email security can provide part of that picture by protecting against email or web-borne threats, enterprises will ultimately need to combine those with other techniques such as cloud application control and multi-factor authentication to help address the challenges of Shadow IT and obtain a more holistic view of their overall SaaS security posture.”