04:34 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

CloudLock Labs Introduces GeoFence For Google Apps

Solution allows organizations to track where users are logging in and accessing data from

CloudLock, the leading cloud information security provider, announced today a new line of innovation-focused projects, CloudLock Labs. As part of the release, they have also made the first offering to carry the Labs name available on the Google Apps Marketplace, GeoFence for Google Apps. Organizations can use this experimental new solution to track where their users are accessing data from, what locations users are logging in from, and any changes made by admins in their domain. As a CloudLock Labs project, GeoFence for Google Apps represents a new line of highly innovative offerings for the cloud security company, designed to respond to risks that traditional security products can or do not address.

"We envision Labs as an innovative, adventurous, and essentially customer-driven way to drive cloud security forward. Look at the news on any given day and you'll clearly see that the number of risks and data breaches is only accelerating; we've introduced CloudLock Labs as part of our commitment to innovation in helping organizations meet those challenges," said Ron Zalkind, CTO and lead researcher for CloudLock.

CloudLock is introducing GeoFence as a free offering to the CloudLock information security solution suite. As the only security vendor offering this capability, security professionals using GeoFence can quickly identify activity within their Google domain, where those users are logged in from, and what changes are occurring inside of their domains (for example, users being added to or removed from groups). This location-based awareness is designed to give administrators the ability to identify potential data theft and malicious activity before it becomes a data breach or data loss issue.

"We are encouraging security professionals to explore the GeoFence functionality to see for themselves the benefits of CloudLock's security products," continued Zalkind. "Being able to manage and reduce risk is at the heart of what we do, and GeoFence represents our ongoing commitment to helping organizations do so more efficiently and effectively."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web