Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



CensorNet launches new Unified Security Service

April 2016 by Coline Magne

As new technologies emerge, cybercriminals continue to look for new weaknesses to exploit. With the exponential rise of cloud applications in today’s digital workplace, organisations now need a 360 degree view of all data flow across all communications channels, regardless of where users access the data from or from what devices.

CensorNet announces the availability of its Unified Security Service, CensorNet USS. The new cloud-based solution empowers organisations to monitor and control the use of both web and cloud applications from a single management dashboard, and uses authentication technology to help administrators safeguard access to the service. CensorNet USS enables organisations to simultaneously protect employees against cyber-threats, accidental or intentional leaks of sensitive data, and also keep the business safe from the risks associated with cloud applications and Shadow IT.

New features include policies to control cloud application use that can be set at a granular level based on the individual or role, the device being used, the network connected to, specific functions within the application and the location of the user. For example, someone can have ‘view only’ access to an application that includes sensitive data when they are using a tablet in an airport, but are able to download or print that information when at their desktop and connected to the corporate network. These policies are enforced even when users attempt to circumvent controls by using anonymising proxy sites.

Garrett Bekker, Senior Analyst at 451 Research comments: “Enterprises can derive more value from security when they can see the complete, bigger picture. While web and email security can provide part of that picture by protecting against email or web-borne threats, enterprises will ultimately need to combine those with other techniques such as cloud application control and multi-factor authentication to help address the challenges of Shadow IT and obtain a more holistic view of their overall SaaS security posture.”

See previous articles


See next articles