KuppingerCole Report
Executive View
By Mike Small

Symantec CloudSOC™

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. This report provides an up to date review of Symantec CloudSOC™ which strongly matches KuppingerCole’s recommended functionality for CASBs. It provides a valuable tool that organizations can use to improve governance over their use of cloud services.

1 Introduction

Organizations are embracing the use of cloud services because of the benefits that they bring in terms of speed to deployment, flexibility and price. ...

Login Free 30-day Select Access Get full Access

2 Product Description

Symantec is an US software company headquartered in Mountain View, California that specializes in IT security software and services. In June 2016 Sym ...

Login Free 30-day Select Access Get full Access

2.1 Symantec CloudSOC™

The Symantec CloudSOC platform provides the capabilities for organizations to exploit cloud applications and services while remaining secure and compl ...

Login Free 30-day Select Access Get full Access

2.2 Symantec CloudSOC™ Audit

Symantec CloudSOC Audit discovers and monitors the cloud services being used from within an organization and, in conjunction with other Symantec produ ...

Login Free 30-day Select Access Get full Access

2.3 Symantec CloudSOC™ Security for SaaS

Symantec CloudSOC Security for SaaS monitors and controls use of a wide range of sanctioned SaaS and IaaS platforms including Office 365, G-Suite, Box ...

Login Free 30-day Select Access Get full Access

2.4 CloudSOC™ and Symantec DLP integration

Integration between Symantec CloudSOC and Symantec DLP enables customers to leverage their existing on-premises DLP policies and workflows to extend p ...

Login Free 30-day Select Access Get full Access

2.5 CloudSOC™ and Symantec Cloud Data Protection Gateway

The Symantec Cloud Data Protection Gateway enables organizations to define field level data protection policies that govern exactly how sensitive data ...

Login Free 30-day Select Access Get full Access

2.6 CloudSOC™ and Symantec™ Information Centric Encryption

Symantec Information Centric Encryption delivers protection that follows data wherever it is stored, used, or moved to. It protects data with enterp ...

Login Free 30-day Select Access Get full Access

2.7 CloudSOC™ and Symantec Advanced Threat Protection integration

CloudSOC integrates with Symantec Advanced Threat Protection including file reputation intelligence, A/V scanning, and sandboxing technologies to prot ...

Login Free 30-day Select Access Get full Access

2.8 CloudSOC integration with Symantec Endpoint Protection

CloudSOC integrates with Symantec Endpoint Protection (SEP) through the single SEP agent. This agent integrates with CloudSOC Audit to provide visibi ...

Login Free 30-day Select Access Get full Access

2.9 CloudSOC™ and Symantec VIP integration

SymantecTM VIP (Verified-ID Protection) is a cloud-based, strong authentication service that provides secure access to sensitive data and applicatio ...

Login Free 30-day Select Access Get full Access

3 Strengths and Challenges

Symantec CloudSOC strongly matches KuppingerCole’s recommended functionality for CASBs. It provides capabilities which go beyond those found in fir ...

Login Free 30-day Select Access Get full Access

Copyright

©2019 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top