“Sorry, I can’t book any more customer meetings this week because I need to go back to all the files I’ve shared externally, and remove all the outdated permissions for my customers and vendors”.... said no one ever.
In which reality do you operate?
External and/or public sharing is completely disabled and it’s definitely harder to drive business enablement with external parties. This generates unnecessary tension and bad company culture between employees and Security/IT teams who both simply try to do their job.
Employees share company data extensively to external parties and even publicly to anyone with a link so that business enablement is done efficiently but at the same time, Security/IT teams either don’t have visibility on what’s going on or don’t have a way to automate day to day labor-consuming tasks, such as permissions cleanup, reporting, anomaly detection, vendors offboarding, etc. This increases the likelihood of a data leak.
In the last 10 months, the DoControl team has created a category-defining product that helps organizations prevent data breaches by balancing security with business enablement on the world’s most popular SaaS applications. Equally important, we have strongly invested in our security & compliance program to protect our customers’ data at best practice.
Today, we’re excited to announce the official launch of the DoControl platform and our $10M Series A round to accelerate customer growth and continue innovating on behalf of customers. RTP Global led the round with participation from existing investors StageOne Ventures, Carduman Capital, and the CrowdStrike Falcon Fund.
Since day 1, we have been very aggressive in exceeding our customers’ expectations and meeting all of their product, security, and support requirements. If you are a potential or existing customer suggesting a feature request, we will listen, investigate, and come up with a solution for you. If this doesn’t happen, DM me and we’ll correct the issue and send you a SWAG.
This is our culture at DoControl. We never give up and always find creative solutions to customer pain points. Please join us if you can resonate with this statement.
This is just the beginning of our journey and we could not be more excited about what comes next. Our product is full of awesome capabilities and visionary approaches taking the SaaS Security category to a whole new level.
This stat comes from the industry report we published earlier this year: The Immense Risk of Unmanaged SaaS Data Access. It’s a great read. We recommend you check it out.
We are excited to announce our expansion of DoControl’s integrated technology partnership program to include Datadog. As a leading platform provider for monitoring and security for cloud applications, the integration with Datadog allows security operations teams to have a more holistic view of risk across the mission-critical Software as a Service (SaaS) applications being leveraged to enable business enablement and productivity.
The last time the RSA Conference was a live, in-person event was right before the world as we knew it came to a screeching halt. Every technology vendor did their best to rollout “virtual” events which were in no way comparable to the real thing. Everyone – including all of us here at DoControl – was missing the “human connection.” As a vendor that was “born out of the pandemic,” we were very excited to (for the first time!) meet face-to-face with prospects, customers, peers, partners and more to talk about all things Software as a Service (SaaS) data security.
When it comes to addressing insider risk, security starts within. Protecting sensitive company data from exfiltration and misuse requires a combination of the right people, process, and technology. Managing insider risk and preventing threats to the business is not achieved with any of these pillars individually. Modern businesses require technology that prevents and detects unauthorized access to critical assets; processes to support automated data access remediation; and people that are educated about – and watchful of – potentially risky activity who can course-correct during potentially risky activity. Modern organizations need all three pillars interconnected in order to protect their most critical assets.