Advanced threat and data protection for Microsoft Office 365, Google Workspace, and other cloud services

Proven Office 365 and Google Workspace protection

Uncovers ransomware, business email compromise (BEC), and other malicious attacks. </b>Cloud App Security finds unknown malware by using pre-execution machine learning. The document exploit detection engine discovers malware hidden in office files. Artificial intelligence checks email behavior, intention, and authorship to identify BEC attacks

In 2020, Cloud App Security caught 16.7 million high-risk threats that weren’t caught by Microsoft® Office 365® or Google Workspace™. This second layer of defense blocked threats beyond those detected by the cloud email services’ built-in security

Simple integration and management

  • Easy API integration: Quick setup without impacting users or devices
  • Centrally manage threat and Data Loss Prevention (DLP) activity across cloud services, endpoints, and web traffic with Trend Micro Apex Central
  • Sandbox analysis reports show the step-by-step activity of the malware and exports indicators of compromise (IoC) to Trend Micro and third-party security layers to prevent subsequent attacks
  • Representational state transfer (REST) APIs: Programmatic access through Cloud App Security automation and integration APIs enable your security team to investigate, detect, and respond to threats

Superior protection from unknown malware

Discovers unknown malware using patternless technologies. Pre-execution machine learning, document exploit detection, and behavior analysis with top-rated Trend Micro™ Deep Discovery™ sandbox technology detect unknown malware and shares intelligence learned during analysis with other security layers. Pre-filter sandbox technology avoids unnecessary delays.

Extended Detection and Response

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Identifying compromised accounts and detecting malicious emails is critical to threat detection. With the extended detection and response (XDR) capabilities of Trend Micro™ Vision One, security analysts can:

  • Trace a root cause analysis of a threat to Office 365 email or Gmail™ to identify the impact and stop the spread
  • Sweep inboxes for IoC and quarantine or delete emails
  • Leverage other XDR products for correlated detection, investigation, and response
  • Employ Trend Micro™ Managed XDR, our MDR service
  • Access the Trend Micro Vision One threat defense platform with advanced email XDR capabilities. Automatically included in Trend Micro™ Cloud App Security purchases, outside of existing Trend Micro™ Worry-Free™ bundles.

Detects and Blocks incoming and internal phishing attacks

Uses massive threat intelligence from our Trend Micro™ Smart Protection Network™ to find and block URLs hidden in the email message body and attachments that lead to malware. Unlike email gateways that only scan external email, Cloud App Security also scans internal email and file sharing services to detect attacks already in progress. It also discovers criminal attempts to infiltrate your organization from compromised accounts or devices and allows manual scanning when needed.

Communicate and collaborate more confidently in the cloud

Enhance the security of Office 365, Google Workspace, and other cloud services by leveraging sandbox malware analysis for ransomware, BEC, and other advanced threats. The security included with Office 365 filters known antivirus threats, but 95% of today’s malware will only infect one device and is unknown to traditional antivirus techniques.

Protect cloud file sharing from threats and data loss

  • Controls sensitive data usage: DLP for Microsoft® OneDrive® for Business, Microsoft® SharePoint® Online, Microsoft® Teams, Dropbox™, Box™, Salesforce®, and Google Drive™. Uses over 200 pre-built and customizable compliance templates to control sharing of controlled data.
  • Protects shared files from malware: Scans files shared from remote workers, partners, and mobile devices to ensure threats don’t migrate through cloud file-sharing and collaboration services.

Simple integration preserves all functionality

  • Direct cloud-to-cloud integration: Uses APIs to enhance protection without complications.
  • Sets up quickly and automatically: API integration requires no software to install, no user setting changes, no proxy to deploy, and no MX record to change.
  • No loss of functionality: Preserves all user and administrative features and functions.