KuppingerCole Report
Executive View
By Mike Small

CensorNet Cloud Security Platform

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. CensorNet Unified Security Service provide a valuable tool that organizations can use to improve governance over their use of cloud services.

1 Introduction

The easy availability of cloud services together with the revolution in the range of devices that can be used to access these services has created cha ...

Login Get full Access

2 Product Description

CensorNet has its headquarters in Basingstoke, UK with offices in Austin and San Francisco, US; Copenhagen, Denmark and Munich, Germany. CensorNet pro ...

Login Get full Access

2.1 CensorNet Unified Security Service

CensorNet Unified Security Service (USS) creates a single cloud platform that provides visibility and protection for Web, Email, User Authentication a ...

Login Get full Access

2.2 CensorNet Cloud Application Control

Cloud Application Control is one module of CensorNet Unified Security Service. It is delivered as a cloud service and enables an organization to disc ...

In this diagram the Cloud Dashboard is the main interface for the user. It is more than just a simple dashboard, it sits on top of the cloud infrastr ...

Login Get full Access

2.2.1 Detection of Cloud Service Usage

It provides an overall view into the cloud services in use, including those not categorized by web proxies or firewalls. CensorNet’s Cloud Intellig ...

Login Get full Access

2.2.2 Control Cloud Service Usage

CensorNet Cloud Application Control makes it possible to enforce access policies for all the cloud applications in use. These policies provide both c ...

Login Get full Access

2.2.3 Directory Integration

To discover and control access to cloud services it is important to be able to correctly identify the users of these services. Hence integration with ...

Login Get full Access

2.3 Multi-Factor Authentication

CensorNet Multi-Factor Authentication is adaptive, real-time, challenge-based and session-specific. It takes advantage of the contextual information ...

Login Get full Access

2.4 Protection against Cyber-Threats

CensorNet Unified Security Service includes real-time anti-malware scanning at the network perimeter - Incorporating multiple layers of security inclu ...

Login Get full Access

2.5 CensorNet Email Security and Microsoft Office 365

Microsoft Office 365 is a cloud service widely used by many organizations. CensorNet Unified Security Service provides functionality that can enhance ...

Login Get full Access

2.6 Compliance and Reporting

The range of laws and regulations with which organization need to comply have many requirements in common. CensorNet Unified Security Service help or ...

Login Get full Access

3 Strengths and Challenges

Cloud services are outside the direct control of the customer organization and their use places the control of the service and its infrastructure in t ...

Login Get full Access


©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.