Discover, Classify, and Manage Third Party Apps
On premise, security administrators deploy application whitelisting and blacklisting rules that control the use of externally sourced applications that have the ability to access user data. Similarly, in Google Apps, while some apps can be controlled via the cPanel, most cannot.
Apps Firewall gives organizations the visibility required to establish enterprise-class cloud security practices for their accounts and data, with comprehensive detection of third party apps granted access via OAUTH. With this information, security administrators can choose to whitelist or blacklist applications based on their risk profile, access level, and breadth of use.
Automated Compliance for Acceptable Application Policies
Lead time between rogue application implementation and control is a significant issue for most organizations. When users authorize apps off-network, such as from a mobile device or a personal computer, only CloudLock’s Apps Firewall can detect and automatically revoke them without any manual intervention from the IT team.
Any application can be blacklisted by classifying it as banned; Apps Firewall handles it from there, revoking the offender and then notifying the users that they installed a rogue app. If necessary, those notifications can also be shared with IT management and auditors.
Millions of applications are developed and released into the Google Apps ecosystem on an on-going basis, and understanding which are present in your domain and the potential risks they pose can be a daunting task. With Apps Firewall, security administrators can quickly identify which applications have been trusted or banned by the CloudLock community, and act with the knowledge that they are not alone in their efforts.
Apps Firewall’s Community Trust Rating and risk statistics harness and analyze the classification data collected from hundreds of Google Apps domains secured by Apps Firewall every day, and ensures that even in a modern, mobile, and highly dispersed environment, IT can maintain the same levels of security that they’ve traditionally enjoyed on-premise.