The top three policy violations detected in enterprise cloud services include DLP policy violations, cloud activity policy violations, and anomalous activity violations.
For traditional web traffic, the top three policy violations reported include acceptable use policy violations, malicious site violations, and malware detections. This data indicates the need for one tool or technology to address modern threats – a “one size fits all” for cloud and web.
While identifying sensitive data and preventing its movement is critical to specific cloud services, policing acceptable use of web applications is a top and different challenge altogether.
Read more: Help Net Security