Home » Computer & Software » Hardware » Elastica Securlets(TM) Extend Security and Compliance to Microsoft Office 365 Cloud Applications
Ihren XING-Kontakten zeigen

Elastica Securlets(TM) Extend Security and Compliance to Microsoft Office 365 Cloud Applications

SAN JOSE, CA — (Marketwired) — 11/06/14 — (), the leader in Data Science Powered Cloud Application Security, today announced availability of their Securlet for Microsoft Office 365 and their Securlet for Yammer. Available as part of the Elastica CloudSOC platform, both Securlets identify and block suspicious account behaviors and compliance-related data exposures, monitor user activity and enforce granular policies to reduce the risk of data breaches and compliance violations in the cloud.

Delivered as a SaaS product, the Securlets can be easily onboarded with a few clicks, making it possible for security and risk professionals to uncover data leakage vulnerabilities, data theft susceptibilities and compliance violations caused by activities on corporate Yammer, OneDrive and other Microsoft cloud-based user accounts.

“Office 365 and Yammer enable advantages that enterprises are using to gain agility and efficiency. Emerging alongside the rise of cloud applications is a new –shadow data– threat resulting from the widespread sharing of compliance-related data that is hidden from IT security–s view,” said Rehan Jalil, CEO of Elastica. “Our new securlets offer a new layer of protection within these services, allowing businesses to take full advantage of cloud applications without sacrificing security or compliance.”

Elastica Securlet for Office 365 leverages advanced data science and machine learning to analyze user activity, file content, sharing patterns and threatening anomalies within Office 365 cloud-based services such as OneDrive and business social network Yammer.

Elastica Securlet for Office 365 provides the following capabilities:

Rapid detection of risky file exposures of various kinds, including public, external and internal exposures. Prioritization of exposure risks based on risk levels.

Deep classification of content, including PCI, PHI and PII, to highlight compliance risks of various kinds in exposed content.

Deep classification of content in Office 365 highlights sensitive types of content in exposed files and includes built-in classifiers such as source code, legal files, health information, as well as custom classifiers.

Detection of compromised or malicious users on Office 365, based on patent-pending machine learning algorithms.

Detection of malware propagation in Office 365 environments, including compromised files in OneDrive.

Policy creation based on users, content, threat and activity types. Dynamic enforcement of policies and automatic remediation of exposures and risks, preventing data loss, compliance violations and account takeovers.

Investigation of incidents, exposures and user activities in Office 365 and correlation across other cloud applications.

Elastica recently published its report , highlighting common security and compliance risks uncovered by the Elastica CloudSOC solution. This report underscores the need for deep understanding of the types of content being shared in cloud-based file sharing apps.

These new Securlets add to the growing library of Elastica Securlets offered on its CloudSOC platform, which provide advanced security functionality for specific SaaS applications. These can be deployed on their own or in combination with any of the Elastica security applications, including Audit, Detect, Protect and Investigate. Free trials of the Securlets for Microsoft Office 365 and Yammer are available at

Join Elastica on LinkedIn:

Follow Elastica on Twitter:

Like Elastica on Facebook:

Elastica is the leader in Data Science Powered Cloud Application Security. Its platform empowers companies to confidently leverage cloud applications and services while staying safe, secure and compliant. A range of Elastica Security Apps deployed on the extensible CloudSOC platform deliver the full life cycle of cloud application security, including auditing of shadow IT, real-time detection of intrusions and threats, protection against intrusions and compliance violations, and investigation of historical account activity for post-incident analysis. Learn more about Elastica at . Follow us on Twitter @ElasticaInc

Joe Franscella
Bhava Communications for Elastica

209-597-6656

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop