Cisco CloudLock
March 03, 2022

Cisco CloudLock

Jerry Alaniz | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco CloudLock

We use Cisco Cloudlock to monitor access to our cloud infrastructure and protect sensitive data. Our organization has been able to identify when unauthorized data access has occurred and allowed the security team to take steps to secure and mitigate recovery. We monitor data and network access to our data from outside the US, personal email sharing, credit card information sharing, social security number sharing, apps in use, and general data risk with Cloudlock.
  • Setup.
  • Cloud access monitor.
  • Notification.
  • IP identification.
  • User identification.
  • Integration with other Cisco products.
  • Unknown user identification.
  • App risk dashboard.
  • Data Risk.
  • Behavioral Risk.
  • Policies.
  • Allowed data to be accessed.
  • Secured data.
  • Meet client security requirements.
We have not used other cloud security products. While choosing a product a large factor was the current and future integrations with other Cisco security stack products. While this product is not the most affordable, the security provided to the organization and client data is well worth the investment. We use SecureX to integrate and perform automated responses.

Do you think Cisco CloudLock delivers good value for the price?

Yes

Are you happy with Cisco CloudLock's feature set?

Yes

Did Cisco CloudLock live up to sales and marketing promises?

Yes

Did implementation of Cisco CloudLock go as expected?

Yes

Would you buy Cisco CloudLock again?

Yes

Cisco Umbrella, Cisco Meraki SD-WAN, Cisco Secure Endpoint (formerly Cisco AMP)
Cisco Cloudlock is a good fit for my organization consisting of 150 end users. While we have a small office product that can expand to cover any size organization, I would assume the overhead to monitor would increase. While my organization's business is in real estate, I would highly recommend this for all businesses that handle sensitive and private data. Being able to monitor our cloud infrastructure has allowed our security team to be more flexible in allowing approved users access as well.