Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
WALTHAM, MA -- (Marketwired) -- 12/03/14 -- Today CloudLock is unveiling the CloudLock Security Fabric, a transformative unified cloud security solution that allows organizations to fully embrace the benefits of public cloud applications securely and in a completely non-invasive way. The Fabric extends cloud security capabilities for the more than five million enterprise users and the 15 billion data points analyzed daily by CloudLock's existing solutions. Focused on providing security insight across data, users and apps, the API-based, cloud-native architecture does not treat the cloud as a problem but as a business enabler. Contrary to traditional man-in-the-middle approaches, the SaaS-based CloudLock Security Fabric deploys in minutes, without requiring any hardware, agents or changes to the network environment.
The cloud economy continues to change the way users collaborate and how data is shared, and the adoption of public cloud applications shows no signs of slowing. Forrester projects that global public cloud purchases will grow from $72 billion in 2014 to $191 billion in 2020 (Source: Forrester, April 2014 - "The Public Cloud Market is Now in Hypergrowth"). While the cloud offers clear business productivity opportunities, organizations are seeking new approaches to secure sensitive corporate data.
"With CloudLock, companies have one unified security dashboard for their cloud apps", said Gil Zimmermann, co-founder and CEO of CloudLock. "CloudLock is the cloud security backbone that transforms the way companies can adopt the cloud and support users, all while keeping their company's data secure."
The CloudLock Security Fabric gives organizations the visibility and control they need to protect sensitive data -- payment card information (PCI), protected health information (PHI), personally identifiable information (PII), intellectual property (IP) -- across a number of public cloud apps such as Google Apps, Salesforce, Dropbox, Box, ServiceNow and more than 9,000 connected cloud apps. CloudLock continuously monitors these apps in real time and detects and responds to security risk such as oversharing, inadvertent exposure, malicious data extraction and cyberthreats. The solution empowers organizations with a number of CloudLock SmartActions or suggested behaviors to remediate security incidents in real time. For example, a policy violation could trigger end users to selectively encrypt sensitive information in files they have shared with external collaborators.
The CloudLock Security Fabric consists of eight core cloud security services:
Unlike man-in-the-middle approaches, CloudLock's API-based cloud-native solution helps organizations protect their cloud environments directly in the cloud without forcing them to funnel traffic through gateways or reverse-proxy configurations, greatly enhancing time to value and accuracy. CloudLock not only continuously monitors cloud apps for security issues from the time of deployment but can also flag incidents retroactively as far back as the time the original cloud app was deployed.
CloudLock Security Fabric ships with the following APIs:
About CloudLock
CloudLock offers the cloud security fabric enabling enterprises to protect their data in the cloud, reduce risk, achieve compliance, manage threats and increase productivity. By analyzing 15 billion+ objects for more than 5 million end users daily, CloudLock delivers the only complete, risk-appropriate and people-centric approach to cloud security. Learn more at www.cloudlock.com.
Lisa Mokaba
InkHouse for CloudLock
Phone: 781-966-4108
CloudLock@inkhouse.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs