21
Intro to SysCloud’s Next Generation Backup, Security and Compliance Center

Intro to sys cloud’s next generation security and compliance center

Embed Size (px)

Citation preview

Page 1: Intro to sys cloud’s next generation security and compliance center

Intro to SysCloud’s Next Generation

Backup, Security and Compliance Center

Page 2: Intro to sys cloud’s next generation security and compliance center

SysCloud Threat CenterBefore You Start: Your Organization Profile

● Before you begin using the New Generation product, enter the SysCloud application as you normally would and respond to the questions in the “Your Organization Profile” prompt

● This information will allow SysCloud to better assess your organization and its applicable threats and regulations

● Afterward, enter SysCloud and click through the quick Get Started tour

Page 3: Intro to sys cloud’s next generation security and compliance center

SysCloud Threat CenterOverview

● 17 Industries Supported

● 4 Modules including: Backup/Restore, DLP, Compliance, User Behavior

● 21 Compliance Laws, Policies and Requirements Covered

● 79 Metrics Included

● 3 Cloud Apps including Google Apps, Salesforce, Box

Page 4: Intro to sys cloud’s next generation security and compliance center

SysCloud Threat CenterThreat Center Dashboard

● The SysCloud Threat Center allows you to scan your Google Apps data and show the threats most relevant to your organization

● The Threat Center highlights risks due to user errors from Behavior, Backup & Restore, Data Loss Prevention, and Compliance modules

Page 5: Intro to sys cloud’s next generation security and compliance center

SysCloud Threat CenterThreat Cards

● In the Threat Center, admins can view information in individual “Threat Cards”

● Each Threat Card is a white box (“card”) with a specific threat faced by your organization

● Users can hover over Threat Cards to see the risks they face and the ways in which they can be remediated

● Users can dive deeper into Threat details including options to view items and take actions

Page 6: Intro to sys cloud’s next generation security and compliance center

SysCloud Threat CenterThreat Center User Behavior

● Admins can view user behavior, including suspicious logins

● Admins can drill down to see login details including failed attempts, successful logins, and their locations

Page 7: Intro to sys cloud’s next generation security and compliance center

SysCloud Threat Center

Threat Card Deep View

In a Threat Center deep view, admins can view full violation details, including violation date, collaborator, owner, threshold, and statusAdmins can:

● Click into the violation to see document or email previews

● Download violations for reporting purposes

● Filter results based on risk thresholds

● Take action on violations, including quarantine of documents

Page 8: Intro to sys cloud’s next generation security and compliance center

SysCloud Threat CenterData Loss Prevention Module

● From the Threat Center or top navigation drop down menu, users can click into the Data Loss Prevention (DLP) Module to gain sharing insights

● Data Loss Prevention monitors and reports access, sharing patterns inside and outside the organization

Page 9: Intro to sys cloud’s next generation security and compliance center

SysCloud Threat CenterData Loss Prevention Dashboard

From the Data Loss Prevention (DLP) Dashboard, Admins can view sharing and collaboration and monitor data leakage

Admins can:● Drill down to see where and to

whom documents are being shared

● View information by users, domains, apps, and particular documents

Page 10: Intro to sys cloud’s next generation security and compliance center

SysCloud DLPDomain Sharing Insights

● From sharing insights, Admins can click into violations, preview documents, filter results, and download results in CSV form for further analysis

● The view to the left is domain sharing insights, but Admins can view document and use sharing insights as well

Page 11: Intro to sys cloud’s next generation security and compliance center

SysCloud DLPUser Sharing Insights

● ● Under DLP menu, there is a range of reports under Reports

● Admins can drill down to sharing detail and view information by users, domains, and documents and emails

Page 12: Intro to sys cloud’s next generation security and compliance center

SysCloud ComplianceCompliance Module

● From the Threat Center or top navigation menu, Admins can click into the SysCloud Compliance module.

● You can initiate a compliance scan of documents, emails, and chat messages to see where and what type of information is being created and/or shared

● The Compliance module compares its scanning insights to existing regulations and finds risks

● Admins can take action by setting specific compliance policies

Page 13: Intro to sys cloud’s next generation security and compliance center

SysCloud CompliancePolicy Templates

● Admins can enter the Compliance module and create a policy from a number of pre-existing templates

● These templates are based on regulations and specific to industries

● Admins can select a template and activate a policy, or customize and activate a policy

● SysCloud templates monitor 21 regulations across 17 industries

Page 14: Intro to sys cloud’s next generation security and compliance center

SysCloud CompliancePolicy Creation

When creating policies, admins have a large degree of freedom to customize and fine-tune policy settings.

Admins can:

● Select who and what policies apply

● Write custom policy rules and conditions

Page 15: Intro to sys cloud’s next generation security and compliance center

SysCloud CompliancePolicy Creation Detail

Furthermore, admins can also customize:

● Who: Choose which org units to apply policies to● What : Choose which services they want policies

to cover● Applications to cover: Monitor and remediate

risks in both gmail and chat● Conditions to Monitor: Set specific conditions

for SysCloud to scan for (pre-built template patterns, keyword patterns, reg-ex patterns)

● Classification: Create risk thresholds for various conditions (low, high, and medium risk)

● Reporting: Use these thresholds to combat false positives and filter violations based on criticality

Page 16: Intro to sys cloud’s next generation security and compliance center

SysCloud CompliancePolicy Creation Further Detail

Actions : Admins can also build actions into their policies. When users violate policies, admins can:

● Revert sharing permissions● Quarantine documents● Auto encrypt files● Allow the users to justify their

violations (exception management)

● Approve or reject justifications● View violations in a violation

report

Page 17: Intro to sys cloud’s next generation security and compliance center

SysCloud Apps FirewallApps Firewall

● In the Apps Firewall module, admins can monitor third party apps installed by users into their Google Drive

● Admins can create New Policies, blocking (blacklist) and allowing (whitelist) specific third party apps

● Admins can view the 3rd Party Apps Report for a comprehensive report on 3rd party apps activity

Page 18: Intro to sys cloud’s next generation security and compliance center

SysCloud ToolsMessaging

● Within the Tools module, admins can customize messaging and choose who to notify of policy violations

● Admins can also select from pre-made templates to communicate with end users

Page 19: Intro to sys cloud’s next generation security and compliance center

SysCloud ToolsTasks

● Within the Tools module, admins can create tasks to admins for themselves and their team including completion dates

● This makes task delegation simple and lowers administrative work overload

Page 20: Intro to sys cloud’s next generation security and compliance center

SysCloud ToolsGoogle Drive Encryption

● Within the Tools module, admins can offer users a tool to encrypt Google Drive files

● Everyone besides the document owner will be prompted for a password when opening sensitive files

Page 21: Intro to sys cloud’s next generation security and compliance center

SysCloud Setup & Settings

● Admins can now assign managers to users via organization units by uploading a CSV file

● Managers are granted privileges to view and release quarantined Google Drive documents

● This allows for lower administrative workload and appropriate delegation of responsibilities