CDSA

DoControl Integrates With Box to Transform SaaS Data Access Security

The solution further secures cross-application, business-critical data, and files accessed by every identity and entity, both internal employees and external collaborators, allowing for content collaboration to be achieved securely.

Recent research found that nearly half of enterprise tech leaders find too much time is spent on manually provisioning and managing apps. In addition, it found other pain points around managing SaaS, including a lack of visibility, data exposure, and unmanageable access. DoControl No-Code SaaS Security Workflows Engine supports organizations in mitigating ongoing risk consistently, with the customization level required to effectively balance security with business enablement.

“By partnering with Box, we will help customers confidently maintain business continuity and mitigate the risk of data breaches, overexposure, and exfiltration,” said Adam Gavish, CEO and Co-Founder of DoControl. “Security teams can effectively extend least privilege to the SaaS data layer and utilize a risk-based approach in securing their Box instances through the prioritization of identities that present higher levels of risk.”

“Organizations today need products that are inherently secure to support employees working from anywhere,” said Fred Klein, Vice President of Business and Corporate Development at Box. “At Box, we continuously strive to improve our integrations with third-party apps so that it’s easier than ever for customers to use Box alongside best-in-class solutions. With today’s integration with DoControl, we are taking that mission one step further to enable our joint customers to have more granular security controls over who has access to their business-critical content.”

Key joint solution capabilities include:

–Comprehensive asset management: Gain full awareness of every entity that is accessing corporate data within Box to identify what needs to be protected;
–Real-time monitoring and control: Monitor every user activity in real-time, with self-service tooling to detect and respond to immediate threats;
–Automated remediation: Establish data access control workflows that are future-proofed, consistently enforced, and allow for secure file sharing between all internal and external users.