Cloud Computing Outlook

Adallom and OPSWAT's New Solution to Govern Companies' Security and Compliance Issues

By Cloud Computing Outlook | Monday, August 24, 2015

FREMONT, CA: Cloud technology awards plenty of benefits along with that numerous security threats for organizations. To eliminate such risks, Adallom,cloud security services provider for enterprise SaaS applications has collaborated with OPSWAT- a security software development tools provider for IT firms, reports Ericka Chickowski for Talkin’ Cloud.

Adallom solution audits user activity of organizations’ protects employees’ assets and digital resources of firms from threats. The collaboration is targeted to develop a new solution for organizations that supports access of cloud apps like Salesforce (CRM), Box, Office 365 and Google Apps through smart phones to end-users.

The new solution will capacitate IT organizations to cope with security and compliance involvements. It will assess and diagnose compliance hazards without interfering end-users operation and at the same time will determine how secure the cloud access device utilized by IT arena is.

Benny Czarny, CEO, OPSWAT informed that Adallom and OPSWAT Gears solution will be implemented in this solution giving device security and compliance to firms before cloud application access. Gears is a network security management platform for IT and security professionals. Gear detects infection and utilizes online technology to diagnose device in the network as well as determine recurring threats and warn user about malicious file they are trying to download.

Adallom at present governs cloud access based on user, IP, role and device status. Its assimilation with OPSWAT casts directing and implementation of access based on the status of devices inclusive of antivirus, firewall, patch status and hardware encryption.

Their integrated solution will provide pre-required hard drives encryption for cloud access, fulfill regulatory compliance demand, keep track of antivirus status and eliminate malware threats and prevent hackers from accessing confidential cloud documents. It will provide their clients self –remediation control of their system and blocks downloads of files.