[ad_1]
WithSecure (formerly F-Secure) on Thursday introduced new features for its collaboration products that extend protection for critical cloud-based Microsoft services.
A new product, Advanced Microsoft OneDrive for Business, autonomously analyzes files stored in OneDrive, leveraging real-time threat intelligence and multi-stage content analysis. Files are continuously scanned and analyzed as they are uploaded to OneDrive, every time they are modified.
WithSecure’s flagship product, WithSecure Elements, operates as a cloud-based security platform that allows organizations to offload security management to trusted managed service providers or choose to manage it in-house. Organizations have the flexibility to choose the functionality they need through various modules such as endpoint protection, endpoint detection and response, vulnerability management, collaboration protection, and more.
Leszek Tasiemski, Head of Product at WithSecue, said: “However, the cloud is a very different environment and many organizations have yet to adapt. The popularity and lack of security of these tools make them an attractive attack vector for attackers and a major concern for enterprises. It’s happening.”
Dave Gruber, Principal Analyst at Enterprise Strategy Group, says the new File Scan/Detonation feature scans all files stored on OneDrive, so it can detect malware that goes unnoticed by traditional endpoint security approaches. I’m explaining. “This adds a new level of layered defense to our endpoint security platform,” said Gruber.
Frank Dickson, director of security and trust at IDC, added that as the nature of business technology continues to evolve, so must security practices and technologies. Dixon says true security modernization will require a fundamental reassessment of risk and risk mitigation controls.
“Collaboration/communication tools in particular require optimization and modern security,” says Dickson. “Hybrid work means that the Internet is the primary network connection. Therefore, to meet new business requirements as much as possible while maintaining an acceptable level of security and integrity, we apply Zero Trust principles. We need to extend it to a collaboration platform.”
[ad_2]
Source link