Enable use of Microsoft's signature productivity tools anywhere while meeting Office 365 security, compliance, and governance requirements
Z Services CASB summarizes all collaboration activities with internal users, external partners, and personal emails along with sharing via anonymous links. Real-time policy enforcement ensures files in Office 365 are shared according to corporate policy. Layer in content rules and enforce remediation actions to remove permissions, downgrade permissions, and revoke links.
Z Services CASB enforces DLP policies across data at rest and in motion to ensure compliance with regulations and internal policies. Z Services CASB supports DLP rules based on keywords, data identifiers, user groups, and regular expressions. Enforcement actions include coach users, notify administrator, block, encrypt, quarantine, tombstone, and delete. Leverage pre-built industry templates, create custom policies in Z Services CASB, or leverage policies in an existing on-premises DLP solution.
Z Services CASB reports on DLP violations in all Office 365 applications and other cloud services in a unified interface with highlighted excerpts revealing the exact content that triggered the DLP policy. During review, if a file does not violate a policy, the reviewer can rollback the remediation action to restore the file and/or its sharing permissions. Quarantined files are stored in a secure account within Office 365, not in Z Services CASB’s platform, for added security.
With Z Services CASB you have the option of leveraging our best-in- class DLP engine or the policies in your existing on-premises solution such as Symantec DLP, Intel McAfee DLP, Forcepoint DLP, and more. Z Services CASB optionally performs a first-pass content inspection, brokers inspection by the on-premises solution, acts as an enforcement point to apply policies to data in the cloud, and registers enforcement in the on-premises solution that maintains the policy.
Z Services CASB captures a complete record of all user activity in Office 365 and leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, Z Services CASB can detect cross- cloud threats that involve usage across Office 365 and other cloud services. As threats are resolved, Z Services CASB automatically incorporates this data into its behavioral models to improve detection accuracy.
Z Services CASB automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat, whether the threat is accidental or malicious. Privileged User Analytics identifies risk from dormant administrator accounts, excessive permissions, and unnecessary escalation of privileges and user provisioning.
Z Services CASB detects compromised account activity in Office 365 based on brute force login attempts, logins from new and untrusted locations for a specific user, and consecutive login attempts from two locations in a time period that implies impossible travel, even if the two logins occur across two cloud services. Darknet Intelligence reveals user accounts for sale online that are at risk of compromise.
Z Services CASB enforces fine-grained access policies, such as allowing document preview on unmanaged devices but preventing downloads to devices without appropriate endpoint security. Z Services CASB can also integrate with rights management solutions and apply IRM protection to files downloaded from Office 365 so that data is protected anywhere.
Z Services CASB identifies all file sharing and collaboration solutions that employees use in place of the corporate standard, Office 365, and provides a risk rating for each service. Using Z Services CASB, you can enforce risk-based governance controls and coach users to Office 365 to improve collaboration while also reducing cost and risk.