2
FORCEPOINT CASB—APP FUNCTIONALITY MATRIX © 2017 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. [DS_FP_CASB_APP_FUNCT_MATRIX_ENUS]-100058.100317 CLOUD GOVERNANCE CLOUD AUDIT & PROTECTION CLOUD APP User Entitlements Review *Data Governance (Data at Rest) **User Login Monitoring ***Post-Login Activity Monitoring Threat Prevention Data Access Control Amazon Web Services (AWS) YES NO YES YES YES YES YES YES YES Box Confluence YES YES YES YES YES YES YES YES YES YES NO YES YES YES YES YES YES YES Dropbox YES YES YES YES YES YES (Browser end - points only) YES YES (Browser endpoints only) YES (Browser endpoints only) Google Apps - Mail, Calendar, Drive, Docs, Sites, Admin Console YES YES YES YES YES YES YES YES YES Jive YES NO YES YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Microsoft Azure Management Portal YES NO YES YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES NetSuite Office 365 YES NO YES YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES - Exchange, Share - Point, OneDrive, Lync, Dynamics, Online Office apps, Desktop Office apps, Admin Portal YES YES YES YES YES YES YES YES YES Salesforce YES NO YES YES YES YES YES YES YES Workday YES NO YES YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Zendesk YES NO YES YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Asana AvailableUpon Request NO Available Upon Request YES YES YES YES YES YES Concur Available Upon Request NO Available Upon Request YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Expensify Available Upon Request NO Available Upon Request YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Facebook Available Upon Request NO Available Upon Request YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES LinkedIn Available Upon Request NO Available Upon Request YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Remedyforce Available Upon Request NO Available Upon Request YES YES YES YES YES YES ServiceNow Available Upon Request NO Available Upon Request YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Success- Factors Available Upon Request NO Available Upon Request YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Twitter Available Upon Request NO Available Upon Request YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Ultimate (Ultipro) Available Upon Request NO Available Upon Request YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES ANY CLOUD APP Available Upon Request NO Available Upon Request YES YES YES (Browser endpoints only) YES YES (Browser endpoints only) YES Identify dormant (i.e., inactive) accounts, orphaned accounts (e.g., ex-employees), and external users (e.g., contractors) to reduce operational costs & minimize associated threats. Identify and inventory corporate files and data stored in cloud file-sharing and sync services. Identify which files and documents are sensitive or contain regulated data and highlight data owners, sharing permissions, and who viewed each file. Benchmark your cloud application security configurations against a set of industry best practices to identify security and compliance gaps. For cloud access, eliminate need for VPN and enable unique policies for managed and unmanaged mobile phones, tablets and laptops. Enable policies to be applied whether originating from browser or rich mobile apps. Real-time activity monitoring by user, group, location, device, time, and department. Real-time activity monitoring by application action, data object, and record. Prevent account takeovers by automatically detecting anomalous activities and either blocking, alerting, or enforcing multi-factor authentication to ensure account security. Visibility and control over access from risky IP addresses, such as Tor networks, anonymous proxies, and malicious IPs. Apply granular policies restricting access to specific data objects and actions (e.g., uploading sensitive documents, changing user permissions, configuring sensitive security settings) based on role or other parameter. Provide real-time visibility and control over uploads, downloads, and sharing of sensitive data based on various criteria (e.g., keywords, phrases, regular expressions, dictionaries, etc.) for 100+ file types. Includes ICAP integration with 3rd-party DLP solutions. App Security & Configuration Review Endpoint Access Control (Mobile & other endpoints) Data Leak Prevention (Data in Motion)

FORCEPOINT CASB—APP FUNCTIONALITY MATRIX · 2017-03-09 · and data stored in cloud file-sharing and sync services. Identify which files ... multi-factor authentication to ensure

  • Upload
    lamcong

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

FORCEPOINT CASB—APP FUNCTIONALITY MATRIX

© 2017 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. [DS_FP_CASB_APP_FUNCT_MATRIX_ENUS]-100058.100317

CLOUD GOVERNANCE CLOUD AUDIT & PROTECTION

CLOUD APP User EntitlementsReview

*Data Governance (Data at Rest)

**User Login Monitoring

***Post-LoginActivity Monitoring

Threat Prevention Data Access Control

Amazon Web Services (AWS) 

YES NO YES YES YES YES YES YES YES

Box

Confluence

YES YES YES YES YES YES YES YES YES

YES NO YES YES YES YES YES YES YES

Dropbox YES YES YES YES YES YES (Browser end-

points only)YES

YES (Browser endpoints only)

YES (Browser endpoints only)

Google Apps

- Mail, Calendar, Drive, Docs, Sites, Admin Console

YES YES YES YES YES YES YES YES YES

Jive YES NO YES YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

Microsoft Azure Management Portal

YES NO YES YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

NetSuite

Office 365

YES NO YES YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

- Exchange, Share -Point, OneDrive, Lync, Dynamics, Online Office apps,Desktop Officeapps, Admin Portal

YES YES YES YES YES YES YES YES YES

Salesforce YES NO YES YES YES YES YES YES YES

Workday YES NO YES YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

Zendesk YES NO YES YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

Asana AvailableUpon

RequestNO

Available Upon Request

YES YES YES YES YES YES

ConcurAvailable Upon

RequestNO

Available Upon Request

YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

ExpensifyAvailable Upon

RequestNO

Available Upon Request

YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

FacebookAvailable Upon

RequestNO

Available Upon Request

YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

LinkedInAvailable Upon

RequestNO

Available Upon Request

YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

RemedyforceAvailable Upon

RequestNO

Available Upon Request

YES YES YES YES YES YES

ServiceNowAvailable Upon

RequestNO

Available Upon Request

YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

Success-

FactorsAvailable Upon

RequestNO

Available Upon Request

YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

TwitterAvailable Upon

RequestNO

Available Upon Request

YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

Ultimate (Ultipro)Available Upon

RequestNO

Available Upon Request

YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

ANY CLOUD APPAvailable Upon

RequestNO

Available Upon Request

YES YES YES (Browser

endpoints only)YES

YES (Browser endpoints only)

YES

Identify dormant(i.e., inactive)accounts, orphanedaccounts (e.g.,ex-employees),and external users(e.g., contractors) toreduce operationalcosts & minimizeassociated threats.

Identify and inventorycorporate filesand data stored incloud file-sharingand sync services.Identify which filesand documents aresensitive or containregulated dataand highlight dataowners, sharingpermissions, andwho viewed each file.

Benchmark yourcloud applicationsecurity configurationsagainst a set of industry bestpractices to identifysecurity and compliance gaps.

For cloud access,eliminate need forVPN and enableunique policiesfor managed andunmanaged mobilephones, tablets andlaptops. Enablepolicies to beapplied whetheroriginating frombrowser or richmobile apps.

Real-time activitymonitoring by user,group, location,device, time, anddepartment.

Real-time activitymonitoring byapplication action,data object, andrecord.

Prevent accounttakeovers by automatically detectinganomalous activitiesand either blocking,alerting, or enforcingmulti-factorauthentication toensure accountsecurity. Visibility and control over access from risky IP addresses, such as Tor networks, anonymous proxies, and malicious IPs.

Apply granular policiesrestricting accessto specific dataobjects and actions(e.g., uploading sensitivedocuments,changing userpermissions, configuringsensitivesecurity settings)based on role orother parameter.

Provide real-timevisibility and controlover uploads,downloads, andsharing of sensitivedata based onvarious criteria (e.g.,keywords, phrases,regular expressions,dictionaries, etc.)for 100+ file types.Includes ICAPintegration with3rd-party DLPsolutions.

App Security &Configuration Review

Endpoint AccessControl (Mobile &other endpoints)

Data Leak Prevention(Data in Motion)

FORCEPOINT CASB—APP FUNCTIONALITY MATRIX

© 2017 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. [DS_FP_CASB_APP_FUNCT_MATRIX_ENUS]-100058.100317

* Fields available for Data Governance

File Owner

Modification

Data Types

Sharing Status

Time

File Name

ICAP Connectors (3rd-party analysis)

File type

File Sensitivity Status

File Path

File Size

Occurrences The total number of matched data types

The last time this file was inspectedLast Inspected

Shared With

Policies Policies that were triggered

The creation time of the sensitive file

The access time of the sensitive file

Creation Time

Access Time

Data Types Details

The data type rules detected in this document

Data Policies The data type policies detected in this document

*** Fields available for Post-Login Activity Monitoring

Action The action that was performed (e.g., download, view, modify, delete)

Data Object The Application Data Object (e.g., SFDC:Opportunity, AWS:EC2 instance)

Record The name of the instance that is associated with the action (e.g., name of file, ID of AWS EC2instance)

Data Types The data types detected in the activity

Category The categories of the detected data types

Data Types Occurrences

The total number of matched data types

Data Types Details

The data type rules

Data Policies The data types policies

Is Sensitive Data

Was sensitive data detected in this alert

Data flow direction (upload or download)

The size of the file that was uploaded or

Direction

File Sizedownloaded

** Fields available for Login Activity Monitoring

Time The time of the event

Account The login name

Agent User Name

User’s operating system login (we know it if desktop agent is used)

Full Name The full name of the user (from AD)

Title The title of the user (from AD)

Department The department of the user (from AD)

Asset The cloud application name

Client Location The geographic location of the user

Client Type Type of endpoint (laptop, desktop, mobile phone, tablet...)

Device OS Type of OS (iOS, Android…)

Device ID Unique ID for each device

Device Status Managed or Unmanaged

Source IP IP address from where access is attempted

Device Locale The locale of the client browser

User Agent The user agent of the browser

Admin The admin of the cloud app

Host The name of the end user host

Session ID Unique session ID number

URL Cloud app URL

Service Location

Location from where cloud app service provider operates

Server IP Cloud application IP

Status Whether a policy is enabled or disabled

Anomaly Examples include Suspicious data access, Unusual endpoint access, Unusual location access, Suspicious data export, Access from external network

Severity Severity levels include Low, Medium, & High

Rule Security Rule triggered by the activity

Mitigation Mitigation options include Alert, Block, & Verify Identity

External Whether user is accessing cloud app from an external network

Authentication Cloud app authentication type

Service Type Cloud application component used (OneDrive, Lync, etc.)

Event ID Unique ID of the activity

Source IP Reputation

The client IP reputation categories

IP Chain The client IP chain as described by the XFF header

Tor Networks Tor network IPs in the client IP chain

Anonymous Proxies

Anonymous proxy IPs in the client IP chain

Malicious IPs Malicious IPs in the client IP chain

Feature Without Agent With Agent

Inspect all activities initiated from a browser

Yes Yes

Inspect all activities initiated from a native thick client (i.e., non-browser)

No(except mobile

email clients and Outlook clients)

Yes

Enforce BYOD access policies (e.g., distinguish between corporate-owned and personal devices)

No(except mobile

email clients and Outlook clients)

Yes

The account marked as file owner in the cloud service

Was this file matched for sensitive content by a 3rd-party DLP vendor

Was this file marked as sensitive or clean during the last scan

A list of users and groups this file is shared with

The sharing status of the file (external, internal, not shared)

The data types detected in the file

Last modification time of the file

The name of the file

The type of sensitive file

The path of the sensitive file

The size of the sensitive file