IDaaS Security

Identity-as-a-Service (IDaaS) solutions, including Okta, OneLogin, and Centrify, provide organizations a seamless single sign-on (SSO) experience for both customers and employees, and simplifies the management of cloud identities.

Protecting IDaaS Environments

Cisco Cloudlock provides advanced user and entity behavior analytics (UEBA) to help organizations protect IDaaS environments from compromise, comply with security requirements, and expand use of IDaaS to the most sensitive applications.

Cisco Cloudlock complements Okta security by integrating to combine login information from Okta with post-login activities and data security to enforce advanced access policies, identify compromised accounts, and revoke access to applications. Cisco Cloudlock also protects administrative access to Okta by alerting on sensitive activities performed by privileged accounts.

Cloud Malware

Discover, Analyze, and Control Malicious Applications with Apps Firewall

  • Combat the risk associated with third-party cloud apps, many of which have excessive permission sets, capable of accessing, modifying, and externalizing corporate data
  • Whitelist or blacklist apps based on the Cisco Cloudlock Community Trust Rating – the largest crowdsourced security analysis of cloud applications trustworthiness
  • Automate policies to govern cloud application enablement based on access scopes
  • Revoke risky apps in your IDaaS in bulk across the entire user base
  • Maintain compliance with SaaS licenses by identifying mis-provisioned and dormant users
  • Combine OAuth revocation in Cisco Cloudlock with your IDaaS’s security capabilities, including deactivating and deprovisioning applications
Cloud Malware

SecOps & Forensics

Manage Incidents

  • Centrally manage, investigate, and take action on incidents for your IDaaS and the rest of your public cloud portfolio, including suspicious admin activities reported by your IDaaS
  • Gain real-time insight into the health of your public cloud applications in one unified dashboard with security analytics
  • Record an immutable audit log of all actions performed as evidence for regulatory compliance and internal policies
SecOps & Forensics

Security Intelligence from Cisco Cloudlock

Experience a Live Demo

See Cisco Cloudlock in action from one of our cloud security experts

Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser