Secure SaaS Apps and Sensitive Data
Control App Access. Prevent Data Exfiltration. Eliminate Credential Theft Risk.
Credential Theft
Data Loss
Malware Spread
SaaS apps are sources of data leaks and the primary targets of credential theft attacks
The prized jewels of hackers are stolen credentials. With IDs and passwords, thieves can gain access to your employees’ Office 365 user accounts, a database in AWS, a private app with sensitive data, or perhaps even your entire corporate network.
With credentials they can upload malicious content like ransomware to spread across your devices and network as files are shared, or they can begin to exfiltrate sensitive data from your applications.
An additional challenge is well-intentioned employees may be engaging in risky behavior while using the public cloud — without even knowing it — potentially accessing unapproved, less secure cloud apps, uploading files when they should not, copying and pasting sensitive content, etc.
Public cloud apps are great for productivity, until a security incident occurs.
Granular App Access Controls
Threat Prevention
Data Security (DLP, RBI-based Controls)
Clientless Cloud Access Security Broker (CASB) access and data-sharing controls coupled with dedicated IP-based access restrictions
With Ericom, each organization can get a dedicated tenant IP address, so you can enforce IP-based access restrictions that ensure only users coming through Ericom’s CASB – regardless of where they are located – can access your SaaS applications. This effectively eliminates the risk of credential theft for your entire company.
Additionally, Ericom’s in-line isolation-based CASB gateway allows you to enforce user, group, device, time, or location-based policies on application access.
If policies permit access, Ericom further allows you to restrict data-sharing functions, such as removing a user’s ability to upload/download files or enter data in cloud apps.
Finally, Ericom CASB includes Data Loss Prevention (DLP) to protect sensitive data, as well as AV and CDR scanning to prevent malicious files from being uploaded to or downloaded from SaaS applications.
Resources View All
Application Access for Unmanaged Devices Solution Sheet
Download PDFWeb Application Isolation Case Study - Multinational Consultancy
Download PDFEricom Security Solutions Summary
Download PDF