Maintain data security, privacy, and control
|
-
Granularly applies security policies in real time or on demand to specified
targets in the protected applications and services
-
Secures sensitive information that resides in the protected applications and
services and enforces compliance to establish privacy standards
|
Find hidden threats and advanced attacks
|
-
Extends the capability of each protected application or service to detect
zero-day malware and malicious code hidden in PDF, Office, and other formats
of documents
-
Integrates with the Trend Micro Antispam Engine and Writing Style DNA
technology to implement heuristic policies to protect email service users from
scam, BEC, ransomware, phishing, and other advanced attacks, and specifies
high profile users and internal domains that are most vulnerable to BEC
attacks for message scanning
-
Integrates the Predictive Machine Learning engine to protect your network
from new, previously unidentified, or unknown threats through advanced file
feature analysis
-
Uses massive threat intelligence to find and block URLs hidden in email body
and attachments, private Teams chat messages, and files in cloud applications
and services, to prevent malware, phishing, and other malicious attacks
-
Detects targeted attacks with the document exploit detection engine and cloud
sandbox technology
-
Aggressively scans email attachments and files to find potential malware and
then opens risky files in a virtual cloud sandbox environment (Virtual
Analyzer) to confirm if they are malicious without using pattern matching
|
Scalable and high performance architecture
|
-
Integrates directly with the protected applications and services to preserve
user experience and administrative functionality
-
Eliminates the need for additional network configuration or traffic rerouting
with API integration
-
Integrates cloud-to-cloud through cloud application provider (Microsoft, Box,
Dropbox, and Google) APIs for high performance and scalability
|
Optimized for the protected applications and services
|
-
Sets up quickly using a service account for each protected application or
service
-
Accesses and scans a user's Microsoft Information Protection (MIP) protected files
in Microsoft 365 services to enable safe sharing of sensitive information inside and
outside your organization
-
Leverages the APIs of Microsoft 365 services, Box, Dropbox, Google Drive, and Gmail
to provide seamless real-time and on-demand protection as well as their webhooks to
monitor any changes in a user account
|
Note
A webhook in web development is a method of augmenting or altering the
behavior of a web page, or web application, with custom callbacks.
|
-
Listed in the application marketplace of Box, Dropbox, and Google
|