Cloud Inline Protection
Cloud Inline Protection
Articles
- Inline monitoring for Cloud apps
- Apply policies based on AD users, groups, or OU
- Apply policies based on the source of traffic
- Apply policies based on the source of traffic, trusted, or untrusted networks
- Apply policies based on the source of traffic, forward, or reverse proxy
- Apply policies based on the application instance
- Apply policies based on the constraint profile
- Apply policies to enforce step up authentication as required
- Analyze user activity, such as uploads or posts, in cloud apps that create or shares content
- Analyze and report on using corporate credentials on non-sanctioned apps
- Inline protection of Cloud apps
- Allow access to a sanctioned instance of a supported corporate app
- Allow access to a sanctioned application based on app tag
- Block risky activities to Unsanctioned/non-IT purchased apps
- Block risky activities to Low / Poor CCL apps
- Alert/block upon detection of password protected files
- Coach users away from unsanctioned applications and allow justification of required use