Cloud Access Security Broker (CASB) | |||||||||||
Delivery | Cloud | Cloud | Cloud | Cloud | Cloud | Cloud, software or appliance | Cloud | Cloud, appliance | Cloud | Cloud | Cloud |
API |
|
|
|
|
|
|
|
|
|
|
|
Advanced Threat Protection | Yes | Yes | Partial | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Partial |
Scan Data at Rest | Yes | Partial | Partial | Yes | Yes | Yes | N/A | Yes | N/A | Yes | Partial |
Malware detection and prevention | Yes | Yes | N/A | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Partial |
UBA | N/A | ||||||||||
Detect Compromised Credentials | N/A | N/A | N/A | N/A | N/A | ||||||
Forward and Reverse Proxy | Yes | Yes | N/A | Yes | N/A | Yes | Yes | Yes | N/A | Partial | Partial |
Consolidated Dashboard | Yes | Yes | Yes | Yes | N/A | Yes | N/A | Yes | N/A | Partial | Partial |
Segregation of Data | Yes | N/A | N/A | Partial | N/A | Partial | N/A | N/A | N/A | N/A | N/A |
Managed/Unmanaged Devices | Yes | Partial | N/A | Yes | N/A | Yes | N/A | Yes | N/A | Yes | Yes |
Role Based Access | N/A | N/A | N/A | ||||||||
Single Sign On | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
Track Downloaded Data | N/A | N/A | N/A | N/A | |||||||
FIPS 140-2 certified | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Encrypt Structured/Unstructered Data | N/A | N/A | N/A | N/A | N/A | ||||||
Simple and Advanced Data Pattern | Yes | Yes | Partial | Yes | N/A | Yes | N/A | Yes | N/A | Yes | Yes |
Prebuilt Library | N/A | N/A | N/A | ||||||||
Inline DDoS Protection | Yes | Yes | N/A | Yes | N/A | Yes | N/A | Yes | N/A | N/A | Partial |
Integration with On-Prem DLP | |||||||||||
Incident Management | N/A | N/A | N/A | N/A | N/A | ||||||
Digital Rights Management | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
Pricing | N/A | N/A | On number of users, apps | On number of users, options | N/A | Per user per year | $5 a month per user | Per user per year | Per month, per hour | N/A | N/A |
Cloud Access Security Broker (CASB) |
Delivery |
API |
Advanced Threat Protection |
Scan Data at Rest |
Malware detection and prevention |
UBA |
Detect Compromised Credentials |
Forward and Reverse Proxy |
Consolidated Dashboard |
Segregation of Data |
Managed/Unmanaged Devices |
Role Based Access |
Single Sign On |
Track Downloaded Data |
FIPS 140-2 certified |
Encrypt Structured/Unstructered Data |
Simple and Advanced Data Pattern |
Prebuilt Library |
Inline DDoS Protection |
Integration with On-Prem DLP |
Incident Management |
Digital Rights Management |
Pricing |