<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

anomaly detection: a critical security component

By Shalmali Rajadhyax  |  August 10, 2016 at 12:30 PM  | 

photo-1453799527828-cf1bd7b2f682.jpegAnomaly detection is an important component of any security solution. Based off of data at login and user activity in the application post login, a complete solution can provide real-time alerts and enable IT to enforce actions when an anomalous event is detected.

Read More

Where Office 365 Falls Short in Securing PHI

By Mike Schuricht  |  August 8, 2016 at 11:49 AM  | 

10.jpg

Healthcare organizations struggle with BYOD security when they adopt cloud applications and are forced to figure out how to protect apps like Office 365. Securing Office 365 becomes even more difficult when medical practitioners work for multiple hospitals since only one mobile security solution, like an MDM, can be installed on a device at a time. However, this is only part of the problem. Securing protected health information (PHI), stored and shared by healthcare professionals, is the real challenge.

Read More

4 Risky Habits of BYOD Users

By Chantelle Patel  |  August 4, 2016 at 10:00 AM  | 

Group-of-Business-People-Using-70132876.jpg

Read More

Capabilities Necessary for Complete Cloud Security

By Chantelle Patel  |  July 27, 2016 at 12:00 PM  | 

Relying on cloud app's native security leaves a data blind spot for organizations that need to protect data. App vendors like Google and Salesforce are primarily responsible for the security of the application and infrastructure, not the data. Data security then becomes the responsibility of the enterprise. Being able to control access as well as protect data is an extremely important task for organizations.

Read More