Cloud Audit

Get a personalized assessment of cloud usage in your organization. Customize your audit with the selections below.

Select one or more options below

GAIN VISIBILITY INTO YOUR ORGANIZATION'S CLOUD RISK
  • All Shadow Apps
    green-check grey-check

    Understand all of the cloud apps in use at your company and their risk:

    • All cloud apps in use
    • Risk rating for every app
    • Potential data exfiltration
    DetailsClose
  • Office 365
    green-check grey-check

    Deep visibility into user activity and security and compliance concerns:

    • Sensitive data in Office 365
    • Inappropriate sharing of data
    • Insider threats and compromised accounts
    DetailsClose
  • Box
    green-check grey-check

    Deep understanding into user activity and security and compliance concerns:

    • Sensitive data in Box
    • Inappropriate sharing of data
    • Insider threats and compromised accounts
    DetailsClose
  • Salesforce
    green-check grey-check

    Deep understanding into user activity and security and compliance concerns:

    • Sensitive data in Salesforce
    • Excessive user permissions
    • Insider threats and compromised accounts
    DetailsClose

Shadow Apps

  • App Discovery

    Discover all cloud applications in use, including access count, upload/download volume, and user count

  • Risk Ratings

    Get an objective 1-10 risk rating for each cloud app and a detailed risk assessment based on 50 attributes

  • Enforcement Gaps

    Identify high-risk apps that users are accessing due to gaps in firewall/proxy policy enforcement

  • Consolidation Opportunities

    Get a detailed summary of redundant services in a category that can be consolidated to reduce cost and risk

  • Threats and Data Exfiltration

    Identify anomalous activity indicative of insider threat or botnets exfiltrating data via shadow cloud services

Permitted Apps

  • Sensitive Data

    Find all instances of sensitive data including PHI, PII, and payment information and a breakdown of each by policy type

  • Sharing and Collaboration

    Audit sharing permissions to identify sensitive data shared internally, externally, and via untraceable links

  • User Permissions

    Identify users with excessive permissions to reduce latent risk of insider threat and account compromise

  • Insider Threats

    Detect user activity indicative of insider threat using machine learning and investigate using a complete audit trail

  • Compromised Accounts

    Identify compromised accounts based on untrusted locations, cross-region access, and brute force login attempts