Govern, Audit and Control G Suite with Microsoft! (Google Apps + Cloud App Security)

Does your organization use G Suite or Google Apps? Do you have these requirements? Audit activity occurring in G Suite (user logons/logoffs, settings changed, files modified, etc) Audit file activity? (what files are being accessed, from where, how they are being accessed, etc) Govern how G Suite is accessed? (Only from a managed device? Only…


Block OneDrive Downloads and Audit OneDrive Activity! (SharePoint too!)

Do you have a business requirement to block the download of specific files or file types from OneDrive? What about detailed auditing to understand what files are downloaded or viewed? Well, today is your lucky day – because this is all possible with Microsoft security technology and takes minutes to create. I’m going to walk…

6

Monitor & protect your data in ALL your clouds, NOW!

Think your organization is operating in a secure and compliant manner? After you answer the following questions, you might want to keep reading… How do you ensure your sensitive data is protected across all the clouds in your environment, whether it’s Office 365/G-Suite/Box/SalesForce/etc? Do you have a single pane of glass view of when someone…


Preventing a data breach, avoiding the news, and keeping your job

With my dog on one side, my green tea on the end table and my tablet in hand, I sift through my Bing news feed on keywords “Cyber Security” as I do every Sunday morning. I come across a few articles that talk about how a company has been breached and tons of intellectual property…


Gaining visibility to “shadow IT” and discovering cloud apps in use today

You may not realize it, but your organization is already operating in the cloud. Even if your IT department hasn’t deployed cloud services yet, your employees already have, and your organization is 100% responsible for the security and compliance of that data. This is known as “shadow IT”, where an organization is using application services,…