MVISION Cloud is now a certified data loss prevention provider for Microsoft teams

McAfee, the device-to-cloud cybersecurity company, announced its cloud access security broker (CASB) technology is now Certified for Microsoft Teams. McAfee MVISION Cloud is now certified for Microsoft Teams to serve the needs of partners and customers with a unified, cloud-native security platform that consistently protects their data and defends against threats in the cloud.

Teams is the hub for teamwork in Microsoft 365 that brings together people, conversations and content—along with the tools that teams need—so they can easily collaborate to achieve more. It’s integrated with the familiar Microsoft Office 365 applications and is built from the ground up on the Office 365, secure cloud. With McAfee MVISION Cloud for Microsoft Teams, companies can answer employees’ requests for a collaboration platform, while enforcing the security capabilities they need to keep data safe.

“We worked to develop a solution that our customers can use to get visibility and control over their data and user activity in Microsoft Teams,” said Rajiv Gupta, senior vice president of Cloud Security, McAfee. “McAfee MVISION Cloud complements Microsoft Teams’ capabilities by using a frictionless, API-based, cloud-native approach that allows security professionals to provide data loss prevention, collaboration control, and contextual access control policies, address threats from insiders and compromised accounts, audit all user activity and secure corporate data as users collaborate in the cloud.”

With McAfee MVISION Cloud, organizations can:

Enforce sensitive data policies: prevent sensitive data that cannot be stored in the cloud from being uploaded to Teams.

Build sharing and collaboration guardrails: prevent sharing of sensitive or regulated data with unauthorized parties in Teams.

Limit activities for users on unmanaged devices and untrusted networks: gain control over user access to Teams by enforcing context-specific policies limiting end-user actions.

Perform forensic investigations with full context: capture a complete audit trail of all user activity enriched with threat intelligence to facilitate post- incident forensic investigations.

Detect and correct user threats and malware: detect threats from compromised accounts, insider threats, privileged access misuse, and malware infection.

Previous articleNew Surface-Mount fully integrated current sensors offer Easy handling and layout for high current density applications
Next articleBringing New centimeter-level GNSS positioning solution to IoT applications
ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.