Binary codes are raining down from a digital cloud with a lock inside.

Cloud Protect Pro: Security for cloud services

The Cloud Access Security Broker (CASB) provides transparency when using cloud services while increasing cloud security.

Securely benefit from the cloud

Cloud Protect Pro is a Cloud Access Security Broker (CASB) that provides transparency when it comes to the cloud services used in a company, while detecting unauthorized shadow IT, regulating cloud use, and increasing cloud security. To enable this, it analyzes, controls, and logs the communication between the pseudonymized users and the cloud application. With CASB, companies can extend the control provided by internal security policies to cloud services.


Exploit the benefits of the cloud – securely!

We would be happy to provide you with the right experts and to answer your questions about the planning, implementation, and maintenance of your digitalization plans in the cloud. Contact us, we are here to help.

Cloud Protect Pro: Part of the cloud security architecture

In the concert of instruments for securing multi-cloud strategies Cloud Protect Pro is the Cloud Access Security Broker (CASB): Let the video explain how Cloud Protect Pro fits into the overall cloud security architecture:

Cloud Protect Pro: One service, many functions

Shadow IT analysis

Cloud Protect Pro analyzes log files and can therefore identify all cloud applications used in the company. The solution categorizes and describes the cloud services – and classifies their risk potential. This provides transparency while enabling the evaluation and blocking of risky cloud services.

Monitoring of cloud applications such as Microsoft 365 or Salesforce

User activities and file movements can be evaluated and controlled via interfaces to various cloud services. Cloud Protect Pro analyzes the content and structure of files in cloud applications, enabling visibility and the control of files that are no longer under the direct control of your infrastructure. As a result of this, Cloud Protect Pro offers a complete data loss prevention solution for various SaaS platforms.

Protect data and user accounts against attacks

Based on behavioral patterns, Cloud Protect Pro analyzes user accounts for log-in attempts, unusual upload rates, download rates, or document types, for example. Malicious files are detected and rendered harmless by anti-virus protection.

Monitor and control shadow IT

The unfiltered use of cloud services represents a challenge for many companies. Confidential and business-critical data is processed or exchanged using insecure apps. These data leaks can result in the loss of intellectual property and violate compliance and privacy regulations. Cloud Protect Pro makes cloud usage transparent while identifying security risks. Data sharing and conspicuous user behavior is detected. By monitoring compromised data and encrypting sensitive content, Cloud Protect Pro prevents hackers from stealing data. 

Use the cloud securely with Cloud Protect Pro

  • Analyze and control the use of cloud services by selecting secure cloud apps
  • Create and monitor security policies for SaaS applications
  • Optimize cloud usage costs by avoiding uncontrolled cloud service subscriptions
  • Analyze unusual or risky file movements, download-values, upload-values, or user behavior
  • User authentication and encryption for all communication and data traffic
  • Alarms enable administrators to take countermeasures, adjust security policies, and block dangerous traffic

No security without a cloud strategy

73%

of German companies make use of cloud computing¹

18%

of the companies use a Cloud Access Security Broker²

82%

of the companies think the GDPR has a strong influence on cloud usage²

53%

of IT managers say that more than half of the employees use applications that the IT department is not aware of³

¹ Bitkom, Cloud-Monitor 2019; ² IDG, Cloud Security 2019; ³ McAfee, 2019

Audit at a major bank: alarming results

An audit based on Cloud Protect Pro at a German bank produced some alarming results. For one week, the log files of around 18,000 employees were analyzed. The result: They were using around 1,300 cloud services. The data in use was processed and stored at several hundred destinations around the world. These included some less trustworthy regions on all continents. The volume of data traffic was very high, with the upload volume being particularly high. And this, in turn, represents a significant risk.

White paper: IT Security in the Cloud Age

Risks are lurking in the cloud. A holistic security concept is therefore a must. Which aspects should a cloud security strategy include?

Discover more security solutions

Do you visit t-systems.com outside of Germany? Visit the local website for more information and offers for your country.