• Cloud Security Broker

Multi-Cloud Monitoring, Collaboration Controls, and Data Protection

Cloud-based collaboration tools can transform your business but they also introduce new risks. Your users can rapidly share any file with almost anyone without your visibility or control, significantly raising the risks of data loss, compliance violations and security breaches.

You can’t and shouldn’t try to block cloud-based file sharing, but you do need to restore visibility, control, and governance over your data without disrupting business.

Product Highlights

The Cloud Security Broker (CSB) adds complete visibility and control to collaboration tools enabling your users to safely share business information to get their jobs done. Here’s how:

  • Multi-Cloud Collaboration Controls
  • Cloud-based with API integration
  • Activity Monitoring and Anomaly Detection
  • Compliance Scanning
  • Granular Policy Controls
  • Policy-Based Encryption
  • Any Device, Anywhere

Watch ChalkTalk Video: File Sharing and Collaboration 101

Multi-Cloud Collaboration Controls

CipherCloud CSB provides true multi-cloud security allowing you to get consistent visibility, policy controls and security across many collaboration applications including Office 365, SharePoint, OneDrive, Box, Salesforce and others.

Cloud-based with API integration

CSB is offered as a cloud-based service making it very easy to setup and connect to your business cloud apps through frictionless API integration. control without requiring an inline proxy or changes to end-user behavior.

Activity Monitoring and Anomaly Detection

CSB provides activity monitoring and anomaly detection for users (both internal and external), content, and devices. An intuitive drill-down dashboard helps you spot unusual activity including excessive downloads, content policy violations or geographic anomalies.

Compliance Scanning

Sophisticated compliance scanning lets you easily discover and classify new and existing content. Out-of-the-box policies scan for PCI, GLBA, SOX, HIPAA, credit card numbers, Social Security numbers, ABA routing numbers, national drug codes (NDC), and more. CSB also connect to enterprise DLP systems including Symantec, RSA, Websense, allowing you to extend existing enterprise policies to the cloud.

Granular Policy Controls

CipherCloud makes it easy to create context-aware policies based on who, what, where, and why and automatically take appropriate actions to prevent data loss. Actions can include block, quarantine, redirect, notify, self-remediation, block sharing (internal or external), and encryption.

Policy-Based Encryption

CSB lets you set granular policies to selectively encrypt sensitive file without interrupting the flow of important business. Authorized users can automatically decrypt protected files from both desktop and mobile devices. Only authorized users can view encrypted files, and keys can be revoked if devices are lost.

Any Device, Anywhere

CSB lets users access the cloud directly, from anywhere on any device, without routing traffic through a corporate gateway – ideal for distributed organizations and business partners. When files are encrypted because of security policies, authorized users can still access them remotely with an advanced mobile client (for iOS, Android, Windows, and Mac).

“Not only was CipherCloud’s CASB the best—and only— solution for securing our users and investors and making them legally compliant, CipherCloud’s professionalism and preparedness stood out against other vendors.”

—Chief Information Security Officer

Get the CSB Data Sheet

You can’t and shouldn’t try to block cloud-based
file sharing, but you do need to restore visibility,
control, and governance over your data without
disrupting business. Learn more.

CipherCloud has met the requirements of the CSA Security, Trust & Assurance Registry (STAR) program.

SOC 2 Type 1 & 2 Certified

CipherCloud is SOC 2 Type 1 and Type 2 certified. The SOC 2 report provides a description of the CipherCloud controls, environment and external audit of CipherCloud controls that meet the AICPA Trust Services Security Principle and Criteria.