TrustRadius: an HG Insights company

Cisco CloudLock

Score10 out of 10

11 Reviews and Ratings

What is Cisco CloudLock?

CloudLock is a cloud security option acquired by Cisco in August 2016.

Categories & Use Cases

Cisco CloudLock - Great DLP without the need for an entire team to support it.

Use Cases and Deployment Scope

We use Cisco CloudLock primarily to protect sensitive data from exposure in our Google Drive. Google has been able to go a long way toward replacing other forms of file sharing in our organization, but we still don't want some types of sensitive data there. With a very low false-positive rate (and certainly with no fancy regex configuration required), we can detect social security numbers and credit cards in our Google drive. Automatically notify the user, give them time to take action, and transfer the files out of their account to a secure location if they do not respond. This self-service workflow that Cisco CloudLock enables is why it can scale to such a large organization as ours. Our G Suite user count is relatively massive, but this product works well with minimal IT support. We sometimes need to flag false positives as such (usually in training documents designed to look like the data we're restricting). Cisco CloudLock also has other great features that help us manage our G Suite environment.

Pros

  • Self-service workflows
  • DLP detection with low false positives
  • Good interface for managing incidents
  • Locate and take action on any files within our G Suite implementation

Cons

  • The security event notifications don't come as quickly as I would like

Return on Investment

  • Audit compliance around sensitive data
  • Protecting against accidental exposure
  • Help IT Operations triage of other Google Drive related issues

Other Software Used

Splunk Enterprise Security (ES), Palo Alto Networks Cortex XDR

A versatile and powerful tool for protecting supported SaaS applications

Use Cases and Deployment Scope

Cloudlock helps us with pii protection by reducing dwell time of sensitive files. It also is a major element of our data loss prevention strategy, by allowing us to the transfer of files in and out of the organization. Finally it is a great indicator of accidental deletions of files in SharePoint and alerts us to the cause of missing files.

Pros

  • Data Loss Prevention - files accessed from outside of the organization can be audited or blocked based on content, file type, and regex
  • Policy Management - policy options are sophisticated and give great control over the actions to be taken and when the policy should be triggered
  • Behavioral Analysis - cloudlock is usually the first place we learn about suspicious activity in our SaaS applications, such as login attempts from outside the country

Cons

  • Ease of use - the UI is not the easiest to grok. Some customers install it and expect it to just work, when in fact most of the policies are not enforced by default. Something like a basic tutorial wizard for policies would help tremendously.
  • Dashboard organization - CloudLock does a number of things, but in the UI they are all jumbled together with a single click moving you out of the feature you intended to configure and into a totally different part of the application
  • Limited Supported Offerings - internally and with customers a lot of additional cloud vendors have been requested, but the product only supports a small number of core services, with no roadmap for adding more that I am aware of.

Return on Investment

  • We've identified a number of close calls with sensitive data being prevented from being uploaded to a broader audience than was intended. This saved us from potential liability from a data breach.
  • We identified and were able to react to a huge number of brute force attacks with the alerts set up in CloudLock
  • We are able to discover when apps with sensitive permissions are being connected to our SaaS products and audit or ban them from being used on work devices and resources. This improves our security and productivity and reduces spend on non-work usage of resources.

Alternatives Considered

Amazon Macie

Other Software Used

Cisco Umbrella, Cisco Secure Endpoint, Cisco Secure Access by Duo, Cisco Secure Email, Cisco Secure Malware Analytics

Cisco CloudLock

Use Cases and Deployment Scope

We use Cisco Cloudlock to monitor access to our cloud infrastructure and protect sensitive data. Our organization has been able to identify when unauthorized data access has occurred and allowed the security team to take steps to secure and mitigate recovery. We monitor data and network access to our data from outside the US, personal email sharing, credit card information sharing, social security number sharing, apps in use, and general data risk with Cloudlock.

Pros

  • Setup.
  • Cloud access monitor.
  • Notification.
  • IP identification.
  • User identification.

Cons

  • Integration with other Cisco products.
  • Unknown user identification.
  • App risk dashboard.

Most Important Features

  • Data Risk.
  • Behavioral Risk.
  • Policies.

Return on Investment

  • Allowed data to be accessed.
  • Secured data.
  • Meet client security requirements.

Other Software Used

Cisco Umbrella, Cisco Meraki SD-WAN, Cisco Secure Endpoint (formerly Cisco AMP)

Excellent Security for Cloud Content or Systems and Database.

Use Cases and Deployment Scope

Cisco CloudLock is there to protect, monitor, and secure all the sensitive content in a company, for instance, the encryption key, credit card numbers, and others. Cisco CloudLock uses the access security brokers, which are on [the] cloud, and they help the company to have safe system controls. More so, Cisco CloudLock has alert systems, which are in the form of notifications, making the system controllers away [from] the business operations. Finally, Cisco CloudLock closely monitors the sensitive database, and [keeps] a shield to keep any attack away from the system.

Pros

  • Cisco CloudLock offers a remote access options, very efficient and standard.
  • Robust data security and monitoring of the sensitive database.
  • Has an excellent self service, which is an option for quick operational progress.

Cons

  • Unfortunately, the security notifications takes longer to be delivered.
  • Uncontrollable prices, very high for the common users or application subscribers.
  • The interface sometimes tricks the new subscribers, more so those without any class orientation.

Most Important Features

  • Cisco CloudLock has an instant notification, in the matter security procedures.
  • Cisco CloudLock has an efficient self-service procedure or extension, for suitable business management.
  • Close monitoring of every form of database, and report giving for effective actions to be taken.

Return on Investment

  • Cisco CloudLock makes the sensitive content more secure, easily monitored and operations are always functional.
  • Further, Cisco CloudLock has an automatic notification option, that makes investors understand when things are not well operational.
  • Finally, Cisco CloudLock supports the self-service workflow or operations, making the company more friendly and flowing.

Alternatives Considered

BetterCloud

Other Software Used

Alibaba Cloud Data Integration, Amazon API Gateway, Actian DataConnect

Cisco CloudLock for Cloud Security Solutions

Use Cases and Deployment Scope

We basically use Cisco CloudLock to protect sensitive information along with another security measure we use with our applications. It includes very critical information like credit card numbers, encryption keys, etc. We particularly use BaNCS where we develop software that has high risk and involves banking. As the scope of the software is large and includes millions we set alerts and trigger risk mechanisms in case of inappropriate or malicious actions from the user side.

Pros

  • Efficient alert mechanism for inappropriate actions.
  • UI is good and well managed.
  • We don't have to switch to other portal, we can take action within G suite.

Cons

  • Although alert mechanism is good but it delays a bit.
  • For implementation of DLP we had to hire a expert it took a lot of time to set up.
  • Support [in my experience] is not good.

Most Important Features

  • Alert mechanism is really important.
  • Action within the G suite.
  • Secure connection with remote access.

Return on Investment

  • It has very positive impact.
  • Less monitoring spend.
  • Very cost effective.

Alternatives Considered

McAfee Advanced Threat Defense

Other Software Used

McAfee Advanced Threat Defense, Microsoft Cloud App Security, McAfee MVISION Cloud (formerly Skyhigh CASB)