Why Behavior Analytics Matter for Protecting your Cloud Use

I’k dorsum from Black Hat US 2017! Over the last two days, my friends and I presented over threescore presentations at the Forcepoint booth on topics ranging from Minority Written report to User-Focused Data Protection, to my personal favorite, “Why UBA is essential for the Cloud.” The response was amazing as the audience sizes and demonstrations at our solution pod can attest to. If you weren’t able to attend this year and are interested in why behavior analytics are so of import for protecting your deject use, this blog is for you.

While the majority of companies are focused on telling the story of their applied science, allow’s instead focus on
your
users and employees of
your
organization, as you adopt deject. For example, allow’s imagine a fictional employee, we’ll call her “Ira,” representing a roaming user who accesses sanctioned file sharing applications to get her work washed. That’s straightforward, isn’t information technology? But what would happen if, through her use of your deject instance from her personal device accessed through public wifi, her cloud credentials, username and password were intercepted? How long would it take your organization to detect that someone had taken over Ira’s accounts and considering of her role in the organization, had access to your business IP?

Aaron Smith presents Why UBA is essential for the Deject

Information technology’due south crucial to understand that we all have typical patterns: nosotros don’t use random computers to exercise our work – nosotros utilise the same one for both piece of work and personal shopping and leisure browsing. Nosotros tend to work from the same locations. Generally, we admission the same files most of the time. That’s our behavior. But what happens when something different occurs – dissonant behavior?

How would your system observe when an employee accesses a cloud application from a different device in a far flung location and the traffic never traverses your network security? Would you fifty-fifty notice it? What if this occurrence was 10% of your users? Where would you focus your attention? This is why Forcepoint CASB has invested in behavior analytics in the cloud. UBA isn’t new, but we take innovated to help companies protect themselves through better understanding of how employees admission cloud – and helping them to respond earlier something bad happens.

To farther emphasize this need, esecurityplanet published an article which highlights the need for CASB solutions amidst large enterprises. Vi Top CASB Vendors both informs why you demand a CASB production and serves to remind us that “95% of deject security failures will exist caused by
human failings, rather than cloud service provider security failings.” We agree. And then it is timely that Forcepoint CASB now provides the industry’due south most complete behavior analytics along with automation to help enterprise and authorities security teams reduce fourth dimension to action by focusing on the business concern impact of highest chance users.

Your organization is likely adopting cloud applications and information technology is crucial that y’all understand your requirements for securing the information stored within those apps. Forcepoint tin help you assess your current cloud adoption, from Shadow It to sanctioned apps, and provide a comprehensive solution that protects your users and your data – wherever they reside.

Source: https://www.forcepoint.com/blog/insights/why-behavior-analytics-matter-protecting-your-cloud-use

Check Also

Will Dogecoin Go Up In Value

Will Dogecoin Go Up In Value

On Dec. 6, 2013, Billy Markus and Jackson Palmer decided to combine their dearest of …