Connect with us

Hi, what are you looking for?


Cloud Security

Adallom Brings Protection to Dropbox for Business

Cloud data security firm Adallom today announced integration with popular file sharing and storage solution Dropbox for Business, bringing additional security protections for stored data in the Dropbox cloud.

Cloud data security firm Adallom today announced integration with popular file sharing and storage solution Dropbox for Business, bringing additional security protections for stored data in the Dropbox cloud.

By deploying Adallom with Dropbox for Business, customers will gain visibility into and control over company data shared and stored within Dropbox.

Integration with Adallom allows Dropbox administrators to govern application usage, address compliance mandates, enable data security and protect users from threats in real-time, the company said.

“Dropbox for Business is all about simplifying the way people and companies work together. Adallom’s integration with Dropbox for Business seamlessly delivers governance and security controls for data in the cloud without impacting the user experience people know and love,” said Patrick Heim, Head of Trust and Security for Dropbox.

According to the Dropbox web site, over 100,000 companies are using Dropbox for Business.

Adallom’s governance and security controls for Dropbox for Business include:

Monitor usage – Gain visibility into usage of Dropbox for Business, including which users are accessing the services, how they are accessing, and the files being shared.

Advertisement. Scroll to continue reading.

Address audits and certifications – Identify files with sensitive content, such as social security numbers, credit card numbers or proprietary corporate data, and monitor access to them to address compliance mandates like HIPAA, PCI or Sarbanes-Oxley (SoX)

Implement granular access control – Block or restrict access to Dropbox for Business based on user, role, IP, or devices. Unmanaged device access can be restricted to specific activities, folder or file access.

Enable data security – Encrypt and enable information rights management (IRM) for sensitive files and documents that are downloaded to un-managed personal devices (BYOD) or shared with 3rd parties like partners.

Prevent threats – Detect anomalies and advanced cloud threats using the combination of SmartEngine heuristics and Adallom Labs. More than 74 different variables are used to set the baseline for normal usage within an enterprise.

Extensibility to existing security products – Extend Adallom cloud activities and events to security analytics products and SIEM products like HP ArcSight, FireEye Threat Analytics Platform and others. Integrate with existing DLP classification and network access control (NAC) solutions.

“Adding Dropbox for Business to the growing list of Adallom-supported SaaS applications continues our momentum in a cloud market desperate for real security and management,” said Yinon Costica, Adallom VP of Products. “Dropbox’s large and rapidly growing user base will benefit from Adallom’s enterprise security features.”

The Adallom for Dropbox deployment will be seamless to users but CISOs benefit from the visibility, governance and protection of data in the cloud, Costica said.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...