Protecting the cloud with behavioural analytics

Cloud Security
(Image credit: laymanzoom / Shutterstock)

Protecting data in the cloud requires companies to secure the data itself but also to guard against cyber attacks, stolen credentials and more.

Security specialist StratoKey is announcing what it calls the 'second generation' of cloud protection using behavioural analytics tied to defensive countermeasures, as part of an update to its core StratoKey Cloud Access and Security Broker (CASB) platform.

It allows organisations to build behavioural analysis profiles that track specific user level metrics. These profiles are then tied into the StratoKey Countermeasure engine. When metrics within behavioural profiles are exceeded, StratoKey automatically enacts countermeasures to prevent the threat from progressing.

StratoKey

"Cloud encryption gateways started life as dumb gateways that waved users through, providing they entered appropriate authentication credentials," says Anthony Scotney, founder and CEO of StratoKey. "The second generation of cloud encryption gateways (now known as Cloud Access Security Brokers) are defined by not only encryption, but by Behavioural Analysis, Monitoring and Countermeasures in a single solution that is flexible enough to support all of an organisation’s cloud applications".

Key features of the CASB platform include selective in-app encryption, identity aware authentication and cloud visibility though real-time monitoring and analytics. It also offers behavioural analysis and anomaly detection that are cloud and SaaS application agnostic. It meets the encryption requirements within HIPAA as well as guidelines regarding access control, including implementation specific details.

More information on the latest CASB platform is available on the StratoKey website.

Ian Barker worked in information technology before discovering that writing about computers was easier than fixing them. He has worked for a staff writer on a range of computer magazines including PC Extreme, was editor of PC Utilities, and has written for TechRadar, BetaNews, IT Pro Portal, and LatestGadgets.

Read more
Padlock against circuit board/cybersecurity background
Preparing for the future of cybersecurity with next-gen SIEM
A hand reaching out to touch a futuristic rendering of an AI processor.
Google Cloud unveils new AI Protection security tools, no matter which model you use
Security
Protect your network with an AI-secure browser and SASE framework
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Cartoon Phishing
Hackers use GenAI to attack more frequently and effectively
Latest in Pro
Zendesk Relate 2025
Zendesk Relate 2025 - everything you need to know as the event unfolds
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
AI quantization
What is AI quantization?
US flags
US government IT contracts set to be centralized in new Trump order
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Latest in News
Zendesk Relate 2025
Zendesk Relate 2025 - everything you need to know as the event unfolds
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Google Gemini AI
Gemini can now see your screen and judge your tabs
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand