際際滷

際際滷Share a Scribd company logo
Syscloud Release Notes
Q1, 2017
1. Search bar in threat center for searching threat cards, user threat and
backup profiles.
2. Charts on User Profile Page
3. My Policies Card Order
- Active policies having the latest violations are shown first, followed by inactive
policies which you will see greyed out.
4. Added trend and dashboard for my policies.
- Dashboard tab displays violations by org unit and groups. Also, displays top
five violators on your domain.
- Trend tab shows violation trends over last 30 days.
5. Play/Pause Changes for Threat Cards Policies
- Changed play/pause to toggle button with Red and green colors.
- Toggle buttons are always visible . if any policy is active, protected (green) is
shown , else all are deactivated .
- Next to toggle button a clickable count of number of policies is displayed.
Click on the count redirects to policy creation/modification page.
- Removed Policies and Incidents tab as all details are moved to Threat details
page.
6. Additional Notes
- File level auto encryption is now supported.
- The file will be automatically encrypted again after modification. The file owner has the option
to select if they would like the file to remain encrypted upon decrypting.
- New card introduced to show unencrypted sensitive documents under
Syscloud recommends
- Overriding the end user settings for custom admins
- Custom admins privileges will override end user privileges.
- Trash folder backup for drive.
Ad

Recommended

Risks of not complying with cipa & ferpa
Risks of not complying with cipa & ferpa
SysCloud
SysCloud's June 2016 Release
SysCloud's June 2016 Release
SysCloud
Intro to sys clouds next generation security and compliance center
Intro to sys clouds next generation security and compliance center
SysCloud
Data Consult - Managed Security Services
Data Consult - Managed Security Services
Jad Bejjani
Netcetera Proactive Management Service
Netcetera Proactive Management Service
Peter Skelton
Data Consult Managed Security Services
Data Consult Managed Security Services
Jad Bejjani
Why Use Westech Solutions
Why Use Westech Solutions
Jhugueno
Why Use Wes Tech Solutions
Why Use Wes Tech Solutions
doughold
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
Doug Copley
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
Windows server hardening 1
Windows server hardening 1
Frank Avila Zapata
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
Cloudbrew 2019 - Azure Security
Cloudbrew 2019 - Azure Security
Tom Janetscheck
Manage services presentation
Manage services presentation
Len Moncrieffe
Integrating DevOps and Security
Integrating DevOps and Security
Stijn Muylle
Global Megatrends in Cybersecurity A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity A Survey of 1,000 CxOs
Argyle Executive Forum
Securing a great DX - DevSecOps Days Singapore 2018
Securing a great DX - DevSecOps Days Singapore 2018
Stefan Streichsbier
Different Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
SysCloud Overview
SysCloud Overview
SysCloud
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
SysCloud
Popular privacy & security laws you should know
Popular privacy & security laws you should know
SysCloud
How to do pci compliance in google apps
How to do pci compliance in google apps
SysCloud
How to do pci compliance in google apps presentation
How to do pci compliance in google apps presentation
SysCloud
Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps
SysCloud
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
SysCloud
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani

More Related Content

Similar to Syscloud Release Notes - Q1, 2017 (9)

Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
Doug Copley
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
Windows server hardening 1
Windows server hardening 1
Frank Avila Zapata
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
Cloudbrew 2019 - Azure Security
Cloudbrew 2019 - Azure Security
Tom Janetscheck
Manage services presentation
Manage services presentation
Len Moncrieffe
Integrating DevOps and Security
Integrating DevOps and Security
Stijn Muylle
Global Megatrends in Cybersecurity A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity A Survey of 1,000 CxOs
Argyle Executive Forum
Securing a great DX - DevSecOps Days Singapore 2018
Securing a great DX - DevSecOps Days Singapore 2018
Stefan Streichsbier
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
Doug Copley
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
Cloudbrew 2019 - Azure Security
Cloudbrew 2019 - Azure Security
Tom Janetscheck
Manage services presentation
Manage services presentation
Len Moncrieffe
Integrating DevOps and Security
Integrating DevOps and Security
Stijn Muylle
Global Megatrends in Cybersecurity A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity A Survey of 1,000 CxOs
Argyle Executive Forum
Securing a great DX - DevSecOps Days Singapore 2018
Securing a great DX - DevSecOps Days Singapore 2018
Stefan Streichsbier

More from SysCloud (8)

Different Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
SysCloud Overview
SysCloud Overview
SysCloud
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
SysCloud
Popular privacy & security laws you should know
Popular privacy & security laws you should know
SysCloud
How to do pci compliance in google apps
How to do pci compliance in google apps
SysCloud
How to do pci compliance in google apps presentation
How to do pci compliance in google apps presentation
SysCloud
Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps
SysCloud
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
SysCloud
Different Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
SysCloud Overview
SysCloud Overview
SysCloud
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
SysCloud
Popular privacy & security laws you should know
Popular privacy & security laws you should know
SysCloud
How to do pci compliance in google apps
How to do pci compliance in google apps
SysCloud
How to do pci compliance in google apps presentation
How to do pci compliance in google apps presentation
SysCloud
Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps
SysCloud
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
SysCloud
Ad

Recently uploaded (20)

Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape sch端tzt, was z辰hlt! Und besonders mit dem neust...
Josef Weingand
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
Daily Lesson Log MATATAG ICT TEchnology 8
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
Ad

Syscloud Release Notes - Q1, 2017

  • 2. 1. Search bar in threat center for searching threat cards, user threat and backup profiles.
  • 3. 2. Charts on User Profile Page
  • 4. 3. My Policies Card Order - Active policies having the latest violations are shown first, followed by inactive policies which you will see greyed out.
  • 5. 4. Added trend and dashboard for my policies. - Dashboard tab displays violations by org unit and groups. Also, displays top five violators on your domain. - Trend tab shows violation trends over last 30 days.
  • 6. 5. Play/Pause Changes for Threat Cards Policies - Changed play/pause to toggle button with Red and green colors. - Toggle buttons are always visible . if any policy is active, protected (green) is shown , else all are deactivated . - Next to toggle button a clickable count of number of policies is displayed. Click on the count redirects to policy creation/modification page. - Removed Policies and Incidents tab as all details are moved to Threat details page.
  • 7. 6. Additional Notes - File level auto encryption is now supported. - The file will be automatically encrypted again after modification. The file owner has the option to select if they would like the file to remain encrypted upon decrypting. - New card introduced to show unencrypted sensitive documents under Syscloud recommends - Overriding the end user settings for custom admins - Custom admins privileges will override end user privileges. - Trash folder backup for drive.