Unlock the benefits of cloud-based file sharing and collaboration while meeting security, compliance
and governance requirements
Z Services CASB enforces DLP policies across data at rest and in motion to ensure compliance with regulations and internal policies. Z Services CASB supports DLP rules based on keywords, data identifiers, user groups, and regular expressions. Enforcement actions include coach users, notify administrator, block, encrypt, quarantine, tombstone, and delete. Leverage pre-built industry templates, create custom policies in Z Services CASB, or leverage policies in an existing on-premises DLP solution.
Z Services CASB reports on DLP violations in Box and other cloud services in a unified interface with highlighted excerpts revealing the exact content that triggered the DLP policy. During review, if a file does not violate a policy, the reviewer can rollback the remediation action to restore the file and/or its sharing permissions. Quarantined files are stored in a secure account within Box, not in Z Services CASB’s platform, for added security.
With Z Services CASB you have the option of leveraging our best-in-class DLP engine or the policies in your existing on-premises solution such as Symantec DLP, Intel McAfee DLP, Forcepoint DLP, and more. Z Services CASB optionally performs a first-pass content inspection, brokers inspection by the on-premises solution, acts as an enforcement point to apply policies to data in the cloud, and registers enforcement in the on-premises solution that maintains the policy.
Z Services CASB captures a complete record of all user activity in Box and leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, Z Services CASB can detect cross-cloud threats that involve usage in Box and across other cloud services. As threats are resolved, Z Services CASB automatically incorporates this data into its behavioral models to improve detection
Z Services CASB automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat, whether the threat is accidental or malicious. Privileged User Analytics identifies risk from dormant administrator accounts, excessive permissions, and unnecessary escalation of privileges and user provisioning.
Z Services CASB detects compromised account activity in Box based on brute force login attempts, logins from new and untrusted locations for a user, and consecutive login attempts from two locations in a time period that implies impossible travel, even if the two logins occur across two cloud services. Darknet Intelligence reveals user accounts for sale online that are at risk of compromise.
Z Services CASB audits collaboration activity and visually summarizes all sharing events within the organization, with partners, with personal emails, and via untraceable shared links. Secure Collaboration enforces collaboration policies based on sharing activity and document content and can take action by modifying permissions and revoking links.
Z Services CASB identifies all file sharing and collaboration solutions that employees use in place of the corporate standard, Box, and provides a risk rating for each service. Using Z Services CASB, you can enforce risk-based governance controls and coach users to Box to improve collaboration while also reducing cost and risk.