Proofpoint: Proofpoint CASB is focused on extending DLP and threat protection from email to cloud applications. Proofpoint takes a people-centric approach; It provides granular visibility into who is creating sensitive data and who owns, downloads, uploads, shares and edits that data. It identifies users who have been successfully phished, and those who have been subjected to the highest number of attacks by hackers.
Skyhigh Security: Skyhigh CASB, through built-in deployment modes (forward and back-end proxy), enables real-time control of user access to authorized and unauthorized cloud services. Skyhigh (a unit of Indian IT company Musarubra) focuses on providing comprehensive multi-mode coverage that feeds security events into a machine learning system to provide sophisticated correlation of events, helping security teams focus on real threats rather than false alarms.
Symantec: Symantec, a division of Broadcom, offers its CloudSOC CASB software to monitor and control the use of blocked SaaS applications through extensive API integrations and built-in traffic analysis. Symantec CASB provides complete visibility and automatic detection of high-risk users, compromised accounts, and malicious insiders. Behavior-based ThreatScores allow individual user accounts to quickly identify risky user accounts. The tool automates the flow of structured data for classification into and out of applications, and enforces controls consistent with company policies. The tool includes DLP and CSPM functions.
Zscaler: Zscaler CASB provides built-in, real-time capabilities and out-of-band scanning functionality to protect data, block threats, provide visibility, and ensure compliance. Key features include agentless cloud browser isolation to secure BYOD and third-party devices where software installations are not possible, advanced threat protection to prevent malware from accessing cloud resources in real-time, and cloud sandboxing to detect new ransomware and other zero-day infections. , and Shadow Intelligence Discovery to automatically identify unauthorized applications used by employees and create a risk score for each.