Sales sales@elastica.net

Symantec Data Loss Prevention — Now with CASB

Uncover shadow data lurking in the cloud with the industry’s first integrated cloud security solution that combines the best-in-class data loss prevention (DLP) and cloud access security broker (CASB) technologies from Symantec.

Now you can extend DLP everywhere – both on-premises and to the cloud by adding the Symantec DLP Cloud Service Connector and Symantec CloudSOC.

Read the Brief. Pass it on.


Extend Symantec DLP to the Cloud

Discover Sensitive Data in Cloud Apps

Direct visibility and control over all types of content in more than sixty cloud apps - including Office 365, Box, Dropbox, Google Apps, or Salesforce

Reuse DLP Policies and Workflows

Leverage existing DLP policies and workflows for cloud apps without having to rewrite finely tuned rule sets

Optimize Cloud DLP Performance

Run DLP detection as a service rather than on-premises to gain operational efficiency

Manage DLP Everywhere from One Console

Author DLP policies and remediation workflows for cloud apps, endpoints, networks, and data centers—all from one unified management console

Gain Additional CASB
Security with CloudSOC™

Safeguard against risks of data loss and threats targeting cloud accounts
with visibility and control directly over the use of cloud apps.

Discover Shadow IT

Identify and audit cloud services in use and analyze application risk levels

Detect and Mitigate Risky User Activity

Leverage user behavior analytics to control potentially malicious actions and threats

Protect Against Risk of Exposure

Gain granular visibility and control over user access and transactions with data in cloud apps

Investigate Cloud Incidents

Easily monitor historic cloud events leveraging granular log data through an intuitive user interface

Learn more about CASB

Free Shadow Data
Risk Assessment

Get a look into one of your sanctioned
cloud apps and see if you have...

  • Sensitive data in the cloud
  • Data accessible by external entities
    or the general public
  • Malware
  • High risk users