Few good things about CloudSOC are:
1) Detection: CloudSOC provided full coverage to all the channels, managed or unmanaged devices.
2) Management: Management of the solution is also covered using single pane of glass
3) Reporting: The reports which we get out of the tool are also really good Review collected by and hosted on G2.com.
One key disadvantage for customers using CloudSOC is the dependancy on Symantec on-prem DLP solution. Most of the advanced policies like exact data matching and IDM can be created via Symantec DLP only. Although the Symantec engineering team is working on to reduce this dependency. Review collected by and hosted on G2.com.
The analysis tool enables the analyst to define separate procedures for each cloud platform so that data cannot be exfiltrated. The platform allows cybersecurity analysts to limit data exfiltration and examine every cloud connection. In this case, either a blocking or an allowing action can be chosen by the analyst. The feature is advantageous during night hours, when upload aberrations can arise more frequently, allowing us to apply policies considering working and non-working hours. Review collected by and hosted on G2.com.
During the vendor's presentation, the little tricks for using the solution better were explained. It is, however, difficult to use by a newbie. An analyst could benefit from being trained about the theme. Review collected by and hosted on G2.com.
The integration with Symantec DLP and Symantec WSS Review collected by and hosted on G2.com.
Is not so easy to protect unmanaged access from devices and create policies to do that. Review collected by and hosted on G2.com.
the UI is very simple an intuitive. I find it very easy to find configuration settings and drill down on reports and alerts. I also like the fact that you do not need to relay on internal 2FA, as Symantec allows you to use their own instance. Review collected by and hosted on G2.com.
not having full support for the Office 365 line up. on of our big issues in the lack of visibility into SharePoint and OneDrive external sharing. you product can not alert us when documents containing PHI are being shared with external parties. you also do not support the Teams Chat sessions, we have not visibility there either. Review collected by and hosted on G2.com.
The monitoring and threat protection were the solution's most valuable features. Review collected by and hosted on G2.com.
The data security needs improvement. We should be able to leverage it a bit better for situations where someone may be trying to upload documents onto the cloud application. Review collected by and hosted on G2.com.
Easy to manage, configure and implementation was smooth and simple. Our Accounts Manager is very accessible and I can't say enough about their support team; if you have an issue, they will work with you until you're 100% happy. Review collected by and hosted on G2.com.
It's not a "dislike" but if I had to pick a negative it would be their SSO. It's not as strong as Okta but it's not meant to be. They offer an SSO for those customers who don't have an SSO provider or aren't able to use their existing SSO provider for whatever reason. Review collected by and hosted on G2.com.
Recover and protect system data in case of failure or virus attack.
Artificial intelligence and automatic report. Review collected by and hosted on G2.com.
I like all the tools, but I am having trouble communicating with system support. Review collected by and hosted on G2.com.
It proposes all the cloud platforms and granually the analyst can adapt a different policy for each of them to prevent exfiltration of data. It allows to prevent data exfiltration examinining each connection to cloud solutions and reporting it to the platform managed by the cyber security analyst, in that case the analyst can choose to apply a blocking or allowing policy to the action detected. It is very useful in night hours, where uploading anomalies can appear more frequently, in that case it is possible to apply policy based on working and no working hours. Review collected by and hosted on G2.com.
A focused training provided by the vendor about the theme and explain the little tricks to better use the solution. The solution is not easy to use for a novel, therefore it could be very useful to training an analyst about the theme: Cloud Access Security Broker and later go deeper explaining advantages of it use and the best practices in managing it. Moreover could be a little pre-requisite for the analyst to know as more cloud platform as possbile, at least to know which services they offer, to better analyze the context of a possible exfiltration when it seems to happen. Review collected by and hosted on G2.com.
The discovery of cloud applications is very good, as well as the anonymization feature. Review collected by and hosted on G2.com.
The API integration with BOX and O365 had many issues, it didn´t work as expected. Review collected by and hosted on G2.com.
Feature like;
- ShadowIT detection
- Ability to write protection policy
- Threat Detection
- Granular details on user activity Review collected by and hosted on G2.com.
A bit of more insightful mapping for threat detection and correlation. Review collected by and hosted on G2.com.