The new product, Advanced Microsoft OneDrive for Business autonomously analyzes files stored on OneDrive and then leverages real-time threat intelligence and multi-stage content analysis. The files are scanned and analyzed as they are uploaded to OneDrive on a continuous basis, including whenever they are modified.
WithSecure’s flagship product, WithSecure Elements, operates as a cloud-based security platform that organizations can use to offload security management to a trusted managed service provider or opt to manage in-house. It promises organizations the flexibility to pick and choose the capabilities they need via different modules, including endpoint protection, endpoint detection and response, vulnerability management, and collaboration protection.
“The adoption of cloud-based collaboration tools is now in full-swing and is quickly becoming essential for many companies,” said Leszek Tasiemski, head of products at WithSecue. “However, the cloud is a very different environment and many organizations have yet to adjust. The popularity and lack of security around these tools make them an attractive attack vector for adversaries, which is a significant concern for companies.”
Dave Gruber, a principal analyst at the Enterprise Strategy Group, explained that the new file scanning/detonation capability scans all files saved to OneDrive so it can catch malware that might otherwise go unnoticed by traditional endpoint security approaches. “It adds a new level of layer defense to their endpoint security platform,” Gruber said.
Frank Dickson, who covers security and trust at IDC, added as the nature of business technology continues to evolve, so too must security practices and technologies. Dickson said a true modernization of security will require a fundamental re-assessment of risk and risk-mitigating controls.
“Collaboration/communications tools in particular are in need of optimization and modernized security,” Dickson said. “Hybrid work implies that the internet is the primary network connection. Thus, the principles of zero trust need to be extended to our collaboration platforms to satisfy new business requirements as much as possible while maintaining an acceptable level of security and integrity.”