Cloudlock Part 2, Greyson Technologies

CloudLock Series: Part 2 – Permissions Contained

Hey… you! Shh!! I have the details on our top-secret laser beam project. Here’s the engineering report: topsecretlaserbeamproject.doc

If only it was so easy to catch data loss. We’ve all done it. Sent a password. Saved a credit card number in a form. Shared a file that had some sensitive data in it. In this 3-part series, we’ll discover you don’t know what kind of data your users are sharing both internally and externally and how to fix it. More after the jump.

Sometimes on accident, sometimes on purpose, users share data they shouldn’t. They share it by sending it to each other, they share it by making a file ‘public’, and sometimes they share it by downloading it and taking with them to your competitors.
Ever wonder what kind of data your users are storing and sharing in your corporate cloud-based file storage applications? What about the kind of data they’re sharing in Webex Teams, Slack, or Salesforce?

Maybe you stay awake at night fearful your HR reps stored a bunch of Social Security numbers in a file in Box. Or maybe someone is sharing patient information in Teams. Maybe we have better things to worry about and can stop data loss in its tracks with Cisco Cloudlock.

Cisco Cloudlock, a ‘Cloud Access Security Broker’ – or CASB for short, secures your cloud users, their data, and apps all from one cloud-delivered tool. In this part, we’ll focus on ‘Data Loss Prevention’.

Cloudlock connects with each of your cloud-delivered applications: Office 365, GSuite, Salesforce, Slack, Cisco Webex Teams, Box, Dropbox, ServiceNow, Okta, Amazon Web Services (AWS) and Onelogin. In doing so, Cloudlock can discover all of the content stored – and with whom it was shared – all through existing APIs. Cisco Cloudlock automatically creates a dashboard to show unusual file download and delete activity and unusual countries for which this activity occurred.

From here administrators have control over what content cannot be shared – and with whom. They can choose from many pre-defined policies covering everything from credit card numbers, social security numbers, international bank account information, FERPA related content, patient data, aggressive or discriminatory content – you name it. Administrators can also define their own custom policies to cover anything they wish – including content covered by an NDA or considered intellectual property. Finally, Cloudlock can be set to take action on discovered activities. Notify an admin and end-user, revoke file shares, quarantine files, and delete messages.

With Cloudlock you can sleep easy knowing your cloud-stored data is safe and that intern in finance didn’t accidentally share all those credit card numbers.

At Greyson Technologies we’re invested in our customers’ success. Reach out today for an engineer led Cisco Cloudlock demo in your own environment. Let’s discover and be surprised together the access third-party apps have to your data.



Greyson Technologies, Mike Prosser, Senior Collaboration EngineerMike is a Senior Collaboration Engineer based out of Orlando, FL. He has a CCNP in Collaboration and is an Express Collaboration Field Engineer Representative, Advanced Video System Engineer Representative, and a Cisco IP Contact Center Express Representative. Mike loves Cisco Spark and is a self-proclaimed baking expert (but really, he just knows how to make cookies).