JULY 11, 2024

Practicing What We Preach: Preventing Threats in SharePoint and OneDrive

Explore how Deep Instinct integrated Deep Instinct Prevention for Applications (DPA) with our internal Microsoft SharePoint and OneDrive and strengthened our security.

Deep Instinct is well-versed in the need for speed. The unique pressures of the startup environment necessitate near-constant communication and filesharing between employees and our eco-system of partners to meet the needs of our customers. Those files need to be two things: secure and speedy.  

To address our needs, we’ve developed the capability to integrate Deep Instinct Prevention for Applications (DPA) with our internal Microsoft SharePoint and OneDrive. Let’s look at what this means for us at Deep Instinct and how you can benefit from the same integration. 

Exciting things first: this integration isn’t theoretical — it's already live for Deep Instinct and is delivering four key benefits that help us achieve more as a company:  

  • Real-time threat prevention 
  • Event-driven actions 
  • Seamless user experience 
  • Privacy 

These benefits accelerate our already fast-paced environment and help safeguard the file sharing capabilities we rely on. Now we can be certain when we send or receive files via SharePoint or OneDrive, they’re not malicious.  

Real-Time Threat Prevention 

By integrating Deep Instinct Prevention for Applications with our SharePoint and OneDrive deployments, we scan and classify every file in the environment, quickly quarantining malicious files and stopping them in their tracks. (Of course, those malicious files are coming from outside our organization; we use Deep Instinct Prevention for Endpoints to ensure we're not the ones spreading malware.)

Because the scan process happens in near real time, users sharing and receiving files won’t notice the it taking place. Instead of waiting for a file to be scanned and returned, interrupting the flow of work, files scanned by DPA are available immediately, when we need them.

Regardless of size, DPA integrated in your organization would function much the same. It would give you the same real-time threat prevention capabilities without disrupting workflows. In addition to the regular benefits of a Deep Instinct deployment, your organization would no longer need to rely on inconsistent, cumbersome, and slow tools or worry about blind spots in the data estate. One of our biggest customers scans billions of files a month across their organization in a “real-time” data/file collaboration use case. Deep Instinct works on a huge scale. 

Decide How You Defend 

We see the efficacy of this integration every day at Deep Instinct. Clarity into file delivery and scanning gives us peace of mind, while automatic deletion and notification streamlines the security process – still letting people know why a file may not have arrived. 

Rather than introducing a laborious identification and remediation process, users can choose to allow Deep Instinct to automatically delete malicious files and notify the recipient, or just issue an alert without deleting the file. Instead of waiting for a breach to happen or leaving you in the dark about the status of a file you’ve requested, this method empowers you to choose your next steps to defend against this attack and the next.

Sole reliance on endpoint security solutions should be a last resort. This integration gives us another layer of security before we have to rely on EDR and prevents bad actors from ever reaching the endpoint in the first place. We keep ourselves safe using the same combination of solutions and tools we use to protect our customers.

And when this integration is combined with DIANNA, the industry’s first generative AI cyberassistant to provide malware analysis on known and unknown threats, our security teams can easily examine any quarantined and deleted file to determine in seconds why it was flagged, not hours or days.

Seamless User Experience

This integration continues to offer the seamless Deep Instinct user experience that only we can offer. It’s an experience we trust and that we’re happy to integrate into our own environment and security posture. The combination of speed, accuracy, and information makes Deep Instinct an invaluable tool for our own teams and accelerates our business processes and yours.

Privacy

Deep Instinct is focused on privacy, which is why users are always in control of their own data. Microsoft allows users to “bring your own keys” meaning only the “keyholder” can see the file content. In this case, users control the encryption of SharePoint and OneDrive, not Microsoft. Deep Instinct doesn’t need users to send their data elsewhere to be effective, meaning the chain of custody, encryption, and privacy isn’t broken by a third party. Unlike legacy scanning tools, file provenance can be safeguarded by keeping it within your environment.

The DPA + SharePoint and OneDrive integration is an excellent example of how Deep Instinct implements our products in our own environment. It also illustrates how we can integrate with the same tools your organization already uses to provide a better, safer experience.

Ready to dive deeper? Effective prevention and cybersecurity relies on speed and accuracy. Deep Instinct uses deep learning to prevent threats with more accuracy and speed than any other solution. Learn why deep learning powered threat prevention is at the forefront of the cybersecurity battle.

Security doesn't end with just one tool. Defense in depth is a strategy to keep your organization safe using multiple tools to build an effective wall against breach and attack. Explore how Deep Instinct secures your file uploads to see another step you can take to secure your organization.

And if you're ready to take the next step, request a demo with one of our knowledgable team to see what Deep Instinct can do for you.