Introducing cloud security

Coro's Cloud Security module is a Cloud Access Security Broker (CASB) based solution, providing advanced malware and ransomware detection and remediation for connected users and their cloud drives. This includes detection of:

  • Access violations
  • Identity compromise
  • Malware in cloud drives
  • Mass data download or deletion
  • Suspected bot attacks

Connecting your cloud applications

Coro's Cloud Security module enables you to connect to your organization's cloud applications, ensuring monitored, protected, and controlled user access.

To connect to a cloud application:

  1. Sign in to the Coro console .
  2. From the sidebar, select Control Panel to access the Control Panel . Then, select Cloud Applications :

    Cloud Applications icon in the Control Panel

    Coro displays the Cloud Applications page, where you can connect to (or disconnect from) a range of applications:

    Cloud applications list

  3. Select a cloud application to start the connection process.

As you connect to cloud applications, use this page to view details for each connection. Coro shows the number of protected users, categorized into active and inactive statuses, the number of connected third-party applications, and the current status of the connection:

Cloud applications connected

Important

If the cloud application has a connection status of Connected (not secure), you need to grant permissions for Coro to communicate with the cloud application. Select the connection status link to complete the process.

This might also occur where additional permissions are required to support new functionality added in future versions. As with above, select the connection status to learn more and grant the missing permissions. Your existing Coro protection through previously-granted permissions continues as normal.

Coro supports:

Box

Coro actively monitors Box for unauthorized access, unusual activity, malware, ransomware, and potential data leaks. To connect a Box account, see Connecting your Box account.

Dropbox

Coro actively monitors Dropbox for unauthorized access, unusual activity, malware, ransomware, and potential data leaks. To connect a Dropbox account, see Connecting your Dropbox account.

Google Workspace

To connect a Google Workspace account, see Connecting your Google Workspace account.

Microsoft 365

To connect a Microsoft 365 account, see Connecting your Microsoft 365 account.

Salesforce

For Salesforce, Coro provides malware and ransomware detection, user access protection, and activity management. To connect a Salesforce account, see Connecting your Salesforce account.

Slack

Coro protects Slack user accounts and monitors their activity. To connect a Slack account, see Connecting your Slack account.