Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

How To Demo CASB-9-2-21-Partner Use

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

How to Demo – CASB

Initial Questions to ask Customers

Initial questions to ask customer:

• What Cloud or SaaS Applications are you using today?


• Do you have any cloud application security plans?
• Do you allow users to store any data (including sensitive info) in the cloud?
• What do you know about other CASB Solutions?
• What do you like about it, and what do you dislike about it?

Use the customers answers to direct what you show


and emphasize during the demo.
© 2020 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 2
Proofpoint Cloud App Security Broker (CASB)
for security people serious about cloud threats, data loss and time-to-value

Threat Protection Data Security Cloud Governance


Extend people-centric threat Unify DLP across cloud apps Discover cloud apps and contain
visibility and adaptive access and email Shadow IT, including third-party
controls to cloud apps OAuth apps

Start with API Agentless Architecture


Accelerate your migration to the cloud with an agentless CASB architecture

3
Proofpoint Cloud App Security Broker
Agentless Architecture

Cloud App Gov. & Shadow IT Threat Protection Data Loss Prevention
////
/

Proofpoint
Log Collector
SSL

Application API

Cloud App Security Broker SAML Gateway + PFPT


SaaS Isolation

Outbound API

SIEM
4
Enterprise DLP - Logical Architecture

Alice Bob Carol


(Negligent User) (Compromised User) (Malicious User)

Email DLP - PoD Cloud Apps Endpoint Activities

People-Centric Alerts & Remediations Pipeline

SOAR Data Lake Security Compliance

SIEM Service
Mgmt HR Business
Unified Alert View &
Ecosystem Integrations Remediation Functional Users Access
(APIs) (Browser) 5
(SaaS)
Proofpoint CASB – Salesforce DLP Scan Flow

Saleforce objects can be scanned and masked via APIs:

6
Main Features and Key Capabilities

• Proofpoint CASB secures MS 365, Google Workspace, Salesforce, Box, AWS*, Azure* and
more by combining:
• Compromised account detection and automated response
• Protection against malicious files
• Data security including DLP
• Cloud and third-party apps governance
• *IaaS protection (add-on)
• Adaptive access controls
• People-centric visibility to email and cloud threats helps you identify at-risk users and protect
their accounts and data.
• CASB is part of our people-centric Enterprise DLP platform, which combines content, threat
and user behavior telemetry across cloud, email and endpoint channels to protect against
data loss from negligent, compromised, and malicious users.
© 2020 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 7
Main Takeaways / Differentiators

• Best understanding of threats and protection for cloud services – Proofpoint detects account take over
as well as malicious files and third-party apps in the cloud. We bring people-centric threat visibility and
adaptive controls to cloud applications to prevent account takeover. Through integrations with TAP, Proofpoint
CASB identifies highly attacked people and users recently exposed to phishing attacks. This enables you to
apply stricter controls to most at-risk users and enhances forensics. When an account is taken over, we not
only alert on and remediate compromised accounts, but also post-access suspicious activities such as file
exfiltration and email forwarding to protect users and data.
• Robust cloud DLP, integrated to the Information Protection platform – With Proofpoint CASB, you can
discover and remediate excessive file sharing to protect sensitive data in key cloud repositories. You can
monitor file transfers in cloud apps and prevent data loss using our proxy. CASB is integrated to our broader
Information Protection platform, which allows you to deploy consistent DLP policies across email, cloud, and
endpoints. And by aggregating DLP, threat and user behavior alerts on a single console, you can assess and
respond to user and data risk more efficiently.
• Fast time to value – Agentless in first stage of deployment within depth visibility and remediation; installed in
days; actionable results in less than 4 weeks
• Consolidation – Extend people-centric security to the cloud and reduce technology spend with a CASB that
offers attractive cross-platform integrations with TAP, TRAP, Enterprise DLP, Web Isolation and ITM

© 2020 Proofpoint. All rights reserved | Proofpoint, Inc. - Confidential and Proprietary 8

You might also like