Introducing cloud security

Coro's Cloud Security module is a Cloud Access Security Broker (CASB) based solution, providing advanced malware and ransomware detection and remediation for connected users and their cloud drives.

Coro can connect to an organization's cloud applications to monitor user activity, protect against threats, and control access permissions. To learn more about connecting cloud applications to Coro, see Connecting cloud applications to Coro.

Coro provides detection and remediation for the following threat types:

Configuring cloud security settings

Coro's Cloud Security module provides settings to control your users' access permissions, threat detection policies, and access to third-party applications.

To configure cloud security settings:

  1. Sign in to the Coro console .
  2. From the sidebar, select Control Panel to access the Control Panel . Then, select Cloud Security :

    Cloud Security icon in the Control Panel

    Coro displays the Cloud Security page:

    Cloud Security Policies tab

Choose from the following tabs:

  • Policies : Configure policies for your cloud security relating to access permissions and types of threat.
  • Third-party applications : Block or allow access to the third-party applications your users access through a connected cloud application.
  • Settings : Additional cloud security settings.