CloudWatch CASB
Diode’s CloudWatch service enables the safe adoption of Cloud Applications by providing our clients with the visibility and knowledge required to secure their cloud environment.
Our technology monitors and alerts you on all uploads of your data to SaaS/cloud applications (like Google Drive, Dropbox, Facebook and Salesforce).
We support our clients through their cloud enablement journey by engaging with executive teams, security teams and employees to identify the best solution for refining the usage of cloud applications and assisting employees transition to new or existing business approved applications.
805
Average number of distinct cloud apps used by organizations per month, 97% of which are classed as Shadow IT Apps
53%
More than half of web gateway traffic is related to cloud application services
94%
Nearly all malicious web content comes from a known compromised or fake website.
CloudWatch
Primary Use Cases
Netskope monitors and protects users’ interactions with cloud applications and websites. It enables you to see and control what data is uploaded or shared outside of your business via the cloud. We have listed some of our favorite use cases below that we focus on when working with our customers.
A policy can range from blocking an application and redirecting a user to a business approved alternative, right down to preventing an individual user from uploading a file with specific keywords, document fingerprints or data identifiers.
What is it?
Netskope
Diode’s CloudWatch service is built on Netskope, a leader in the Gartner Magic Quadrant 2022.
This solution is fast and simple to implement, and enables you to monitor and control the interactions between your users and some 40,000 plus cloud applications, no matter where your users are.
Data Collection
The solution collects detailed user and cloud application data to create a picture of user’s interactions with cloud applications. This telemetry can then be used to implement granular policy and controls to support safe adoption and use of cloud technology.
For example, you can: Let users download from Google Drive but disable uploads, while letting them upload to your Office 365, but only download documents to a work machine. Implement pop-up educational messages to direct staff to your sanctioned and secure apps, reducing the chances of exposing sensitive business data and enabling usage of safe cloud applications.
Sovereignty Protection
CloudWatch Data Sovereignty Protection enables you to use algorithms to identify keywords and signs of data exfiltration – based on what your business classes as sensitive.
For example, we can implement policy to detect Te Reo in documents and to tag Māori data (or data that should be subject to Māori governance) and restrict its movement. Our monthly reports provide an outline of where your data has transitioned to on a world map, and contains targeted recommendations to improve data protection.
How do I deploy it?
Implementation
We have a team of specialists to assist you with the deployment of our CloudWatch solution, including policy configuration, and on-going operation of technology.
The CloudWatch solution provides real-time visibility and control of managed devices accessing cloud apps and websites from anywhere. This includes monitoring activity for malware, threat detection, data exfiltration, policy violation and unsanctioned cloud application usage.
Additionally, CloudWatch can be integrated directly with business approved cloud applications to provide visibility of access to resources – from managed and unmanaged devices. Direct App Integration can also perform data at rest malware analysis, files shared externally, data stored in the wrong location and misconfigurations in cloud applications.
Deployment Options
CloudWatch Agent
Implementation of our CloudWatch service is typically performed by deploying a lightweight software agent to users’ laptops and desktops.
The agent has a tiny footprint, takes minimal endpoint resources, and simply steers cloud and web traffic from managed devices to the Netskope Security Cloud.
All proxying and security functionality is performed in the cloud rather than on the agent, and produces little to no latency for end users.
The agent creates a secure tunnel to the Netskope Point-of-Presence (POP) in New Zealand, before traffic is then routed to the appropriate destination.
Direction App Integration
Direct App Integration enables visibility of all activity within business approved applications, including from unmanaged devices.
Controls can be implemented to prevent users from sharing sensitive information, detect and block malware within business applications and identify potentially malicious logins to the connected applications.
Direct App Integration currently supports applications such as Office 365, Box, Salesforce, Google G Suite, AWS, and more.
Our Diode CloudWatch service can answer the following:
Information Theft
Permissions
Security
Become a partner to receive 24/7/365 immediate response support, tailored threat warnings for your environment, analysis on whether you are impacted by new vulnerabilities, security operations support and security monitoring services.
Not sure if you need it? Get in touch now to organise a cyber incident simulation – tailored to your business. These exercises are fun and will identify gaps in your ability to respond. Simulations also build real muscle memory, and our clients have repeatedly told us that they have improved their ability to respond.
In case of an incident or a suspected breach, please get in touch with us immediately at one of the contact details below.