Symantec CloudSOC CASB Overview

Symantec CloudSOC CASB is the #7 ranked solution in our list of CASB solutions. It is most often compared to Microsoft Cloud App Security: Symantec CloudSOC CASB vs Microsoft Cloud App Security

What is Symantec CloudSOC CASB?

The Symantec CloudSOC platform enables companies to confidently leverage cloud applications and services while staying safe, secure and compliant. It provides visibility into shadow IT, governance over data in cloud apps, and protection against threats targeting cloud accounts.

CloudSOC takes a data science approach to security using machine learning at its core and leveraging native SaaS APIs, real-time traffic processing and other data sources to provide insightful visualization and intuitive controls.

CloudSOC offers a cloud audit for Shadow IT plus granular transaction visibility, user behavior analytics (UBA), threat detection, data governance and DLP, security controls and post-incident forensic analysis for sanctioned and unsanctioned cloud apps.

Symantec CloudSOC CASB is also known as CloudSOC, Symantec CloudSOC .

Buyer's Guide

Download the Cloud Access Security Brokers (CASB) Buyer's Guide including reviews and more. Updated: June 2021

Symantec CloudSOC CASB Customers

Globe Telecom

Symantec CloudSOC CASB Video

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
PG
Senior IT Architect at a tech services company with 201-500 employees
Real User
Top 5
Good for blocking access, very scalable, and quite reliable

What is our primary use case?

The main use case of the solution is to control access to the cloud. Companies can control a user accessing Dropbox, Box.com., social media, et cetera. I would say customers mostly deal with file-sharing sites.

Pros and Cons

  • "The active directory integration is very valuable as we can connect to the list of users that we have and the cloud control, the blocking, the access control of the cloud, can be handled by this product."
  • "It's a niche product. Not many people use it, and therefore there isn't as much of a knowledge base surrounding it."

What other advice do I have?

I'm a consultant. I help Symantec customers. We deal with the latest version of the solution. It's a good product, but overall, it's been really good. I would say it's an excellent product. You just need some more effort, putting the examples into the documentation, helping customers do stuff with the product. However, it's always difficult with software because they want you to pay additional services and all that, but they should have at least something written to get you started on that. Maybe we're guilty as we didn't get the training, we didn't get the professional help. Therefore, we're…
AS
Technology Analyst at a computer software company with 10,001+ employees
Real User
Top 10
Good monitoring and threat protection with good stability

What is our primary use case?

Our primary use case was trying to monitor all important sensitive files from the organization as they moved to the cloud. We also used the solution to place a limitation on the file upload. There are some important keywords that were used in the organization. We created a policy in terms of keywords and we were monitoring for them. After six months of monitoring, we had blocked everything that needed to be blocked.

Pros and Cons

  • "The monitoring and threat protection were the solution's most valuable features."
  • "The data security needs improvement. We should be able to leverage it a bit better for situations where someone may be trying to upload documents onto the cloud application."

What other advice do I have?

We're a Symantec partner. The solution was a cloud instance and we integrated the on-premises DLP with the cloud DLP. It was a cloud tenant, so there was an integration file that we have integrated with our on-premise DLP. It was integrated so that whatever policies we had on our on-premise DLP we extended to the cloud. I was quite involved in the implementation and was one of two who handled implementation. The process was purely deployment. It was not a project whereby we had to create the policies. I'd rate the solution nine out of ten. They are integrating some of the policies like UVM…
Find out what your peers are saying about Broadcom, Microsoft, Netskope and others in Cloud Access Security Brokers (CASB). Updated: June 2021.
513,091 professionals have used our research since 2012.
AS
Technology Analyst at a computer software company with 10,001+ employees
Real User
Top 10
Stable with good threat monitoring and excellent technical support

What is our primary use case?

We have a few use cases for the solution. The first is for monitoring of sensitive files in our organization and sending them to the cloud. The other use case is limiting file uploads via important keywords. We have created a policy in terms of keywords and we are monitoring for them. After six months of monitoring, we have managed to block everything.

Pros and Cons

  • "The ability to monitor for threats is the solution's most valuable aspect."
  • "The solution should work to incorporate some machine learning policies like IDM and VML."

What other advice do I have?

We're partners with Symantec. The product is stable and doesn't have any complexity in the tool. It is generally straightforward. For example, if we use Dropbox, we get Dropbox's APIs and it will directly integrate with the Symantec CASB solution and we can integrate them and directly push the policies once we have the integration of the SAS applications. I'd recommend the solution to others. This tool is very simple. The technical support is also strong. If companies end up facing some issues, technical support will do all they can to assist and are able to give answers over the phone. I'd…