Views:
Feature
Description
Maintain data security, privacy, and control
  • Granularly applies security policies in real time or on demand to specified targets in the protected applications and services
  • Secures sensitive information that resides in the protected applications and services and enforces compliance to establish privacy standards
Find hidden threats and advanced attacks
  • Extends the capability of each protected application or service to detect zero-day malware and malicious code hidden in PDF, Office, and other formats of documents
  • Integrates with the Trend Micro Antispam Engine and Writing Style DNA technology to implement heuristic policies to protect email service users from scam, BEC, ransomware, phishing, and other advanced attacks, and specifies high profile users and internal domains that are most vulnerable to BEC attacks for message scanning
  • Integrates the Predictive Machine Learning engine to protect your network from new, previously unidentified, or unknown threats through advanced file feature analysis
  • Uses massive threat intelligence to find and block URLs hidden in email body and attachments, private Teams chat messages, and files in cloud applications and services, to prevent malware, phishing, and other malicious attacks
  • Detects targeted attacks with the document exploit detection engine and cloud sandbox technology
  • Aggressively scans email attachments and files to find potential malware and then opens risky files in a virtual cloud sandbox environment (Virtual Analyzer) to confirm if they are malicious without using pattern matching
Scalable and high performance architecture
  • Integrates directly with the protected applications and services to preserve user experience and administrative functionality
  • Eliminates the need for additional network configuration or traffic rerouting with API integration
  • Integrates cloud-to-cloud through cloud application provider (Microsoft, Box, Dropbox, and Google) APIs for high performance and scalability
Optimized for the protected applications and services
  • Sets up quickly using a service account for each protected application or service
  • Accesses and scans a user's Microsoft Information Protection (MIP) protected files in Microsoft 365 services to enable safe sharing of sensitive information inside and outside your organization
  • Leverages the APIs of Microsoft 365 services, Box, Dropbox, Google Drive, and Gmail to provide seamless real-time and on-demand protection as well as their webhooks to monitor any changes in a user account
    Note
    Note
    A webhook in web development is a method of augmenting or altering the behavior of a web page, or web application, with custom callbacks.
  • Listed in the application marketplace of Box, Dropbox, and Google