Waltham, Mass., June 23, 2016 – CloudLock®, the leading provider of Cloud Access Security Broker (CASB) and Cybersecurity-as-a-Service solutions, today announced the release of the next generation of its innovative machine learning capabilities to include suspicious login activity monitoring, location-based anomaly detection, and IP reputation analysis to identify anomalies, zero in on suspicious behavior, and pinpoint true threats across SaaS, IaaS, PaaS, and IDaaS cloud platforms.
The inability to detect real threats from millions of alerts they receive daily as well as the lack of timely response capabilities are the greatest challenges facing security teams today. Pioneered by CloudLock’s research intelligence arm, the CyberLab, machine learning capabilities are the foundation of the Cloud Security Fabric™, helping security teams narrow their focus on user activities indicative of true threats. Using the company’s Cloud Threat Funnel methodology, along with big data technologies and multiple advanced clustering algorithms, CloudLock’s machine learning technology continuously evolves based on analyzing the industry’s largest data set spanning over one billion files and events monitored daily.
CloudLock’s expanded machine learning capabilities include:
Suspicious Login Activity Monitoring captures high frequency login anomalies, such as login failures and login challenges from unusual devices, geographies and time periods for a given user, indicate potential threats to corporate user accounts. While login challenges are all-too-easy for attackers to overcome, CloudLock’s threat analytics arms corporate security teams with actionable intelligence, enabling quick response times.
Location-Based Anomaly Detection exposes abnormal user activity, where users attempt to login from IP addresses that map to locations that differ from the baseline (corporate headquarters, satellite offices, etc.) within short time frames. Activity outside of the normal baseline could signal an account compromise, requiring timely response to mitigate the situation.
IP Reputation Analysis surfaces user activities with high IP reputation risk scores based on CloudLock CyberLab research enriched with multiple third party threat intelligence services. Security teams have real-time access to outlier user activities based on frequencies (identifying users with exceptionally high counts of different IP addresses) as well as activities from IP addresses associated with malicious activities, such as spamming, zombie networks, and port scanning.
The CloudLock Security Fabric™ helps to automate the remediation of truly malicious threats directly from within the CloudLock dashboard, delivering unparalleled visibility across cloud platforms with the highest signal-to-noise ratio. Multiple response actions, such as encryption, quarantining, end-user notifications and forced step-up multi-factor authentication allow security teams to take a risk-appropriate security stance.
“Security specialists are drowning in the sea of security alerts. By highlighting the 0.02% of alerts that really point to suspicious behavior, CloudLock’s Security Fabric, now enhanced with the most advanced machine learning algorithms, further helps organizations unearth and immediately respond to real security threats,” said Ron Zalkind, CTO and co-founder at CloudLock.
To learn more about how CloudLock works visit https://www.cloudlock.com/products/how-it-works/ or read the CloudLock Q1 2016 cybersecurity report: “The Cloud Threat Funnel: Suspicious User Behavior That Matters.”
CloudLock is the only security vendor uniquely combining U.S. and Israeli Military Intelligence with real-time, crowdsourced cloud security insight. CloudLock continuously monitors over one billion files daily across more than 10 million users. Security professionals feed into CloudLock’s unique security insight through peer-driven, crowdsourced Community Trust Ratings™. This intelligence allows organizations to immediately respond to emerging cloud cyber threats and risky apps.
CloudLock is the cloud-native CASB and Cloud Cybersecurity Platform that helps organizations securely leverage cloud apps they buy and build. CloudLock delivers security visibility and control for SaaS, IaaS, PaaS and IDaaS environments across the entire enterprise in seconds. Founded by Israeli Elite Cybersecurity Military Intelligence experts, the company delivers actionable cybersecurity intelligence through its data scientist-led CyberLab and crowdsourced security analytics across billions of data points daily. CloudLock has been recognized by Inc. Magazine as the fastest growing security product company in the U.S. and by Glassdoor as one of the top 3 best places to work in the U.S. Learn more at www.cloudlock.com.
See Cisco Cloudlock in action from one of our cloud security experts
Your browser version is outdated.
We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!
Click on the icon below to download the latest version of your browserClose