Maintain data security, privacy, and control
|
-
Granularly applies security policies in real time or on demand to specified
targets in the protected applications and services
-
Secures sensitive information that resides in the protected applications and
services and enforces compliance to establish privacy standards
|
Find hidden threats and advanced attacks
|
-
Extends the capability of each protected application or service
to detect zero-day malware and malicious code hidden in PDF, Office, and other
formats of documents
-
Integrates with the Trend Micro Antispam Engine and Writing Style DNA
technology to implement heuristic policies to protect email service users from
scam, BEC, ransomware, phishing, and other advanced attacks, and specifies
high profile users and internal domains that are most vulnerable to BEC
attacks for message scanning
-
Integrates the Predictive Machine Learning engine to protect your network
from new, previously unidentified, or unknown threats through advanced file
feature analysis
-
Uses massive threat intelligence to find and block URLs hidden in
email body and attachments, private Teams chat messages, files, and Salesforce
object records in cloud applications and services, to prevent malware,
phishing, and other malicious attacks
-
Detects targeted attacks with the document exploit detection engine and cloud
sandbox technology
-
Aggressively scans email attachments and files to find potential
malware and then opens risky files in a virtual cloud sandbox environment
(Virtual Analyzer) to confirm if they are malicious without using pattern
matching
|
Scalable and high performance architecture
|
-
Integrates directly with the protected applications and services
to preserve user experience and administrative functionality
-
Eliminates the need for additional network configuration or
traffic rerouting with API integration
-
Integrates cloud-to-cloud through cloud application provider
(Microsoft, Box, Dropbox, Google, and Salesforce) APIs for high performance
and scalability
|
Optimized for the protected applications and services
|
-
Sets up quickly using a service account for each protected
application or service
-
Accesses and scans a user's Microsoft Azure Rights Management
(Azure RMS) protected files in Office 365 services to enable safe sharing of
sensitive information inside and outside your organization
-
Leverages Box's, Dropbox's, Google Drive's, Gmail's, and
Salesforce's APIs to provide seamless real-time and on-demand protection as
well as their webhooks to monitor any changes in a user account
Note:
A webhook in web development is a method of augmenting or
altering the behavior of a web page, or web application, with custom
callbacks.
-
Listed in Box's, Dropbox's, Google's, and Salesforce's
application marketplace
|