Watch log activity, enrich logs with geolocation insights, score risks and inform data loss responses
According to a recent ESG survey, companies are migrating data to the cloud faster than they can secure it. The research reveals 50% of survey respondents say they know that they have lost cloud resident data and 22% suspect they have lost data. The architect of this research, ESG Senior Analyst Doug Cahill, said, “The increased use of both sanctioned and unsanctioned cloud-based applications, in combination with security programs for the cloud that are often less mature than existing on-premise initiatives, has led to a significant loss of corporate data. Top contributors to data loss include violations of security policy, the misuse of access controls, and the implications of employees using their own devices.”
We help organizations understand Microsoft Office 365 use across organizations, and detect and respond to data loss resulting from stolen credentials, insider threats, malicious third parties, ransomware and human error.
Allure’s approach includes three main components:
Our intuitive dashboard captures and visualizes risks so users can easily see noteable events with granular details and geolocation information, identify key indicators used to calculate and prioritize risks, and monitor most active users, domains, locations and operations. Additionally, users can drill down into specific document and user activity to collect forensics during active investigations.
“Allure’s detection and response capabilities intuitively bridge the collaboration benefits of
Microsoft OneDrive, Microsoft SharePoint and Microsoft Teams with the security of Microsoft
Azure Information Protection (AIP), and provides valuable insights to Security Operations teams
who are concerned about the confidentiality of their documents,” said Kartik Kanakasabesan,
Azure Information Protection principal program manager.
Posted by admin