<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

AWS Support is Here

By Mike Schuricht  |  February 2, 2017 at 4:00 AM  | 

Infrastructure as a Service (IaaS) has been a huge driver to move both public and internal corporate apps to the cloud. For many, a public IaaS platform like Amazon Web Services (AWS) is the first foray into the public cloud. Companies are using IaaS for DevOps automation to speed agile development, storing and analyzing large amounts of company data, and to move internally hosted applications from their own data centers to Amazon AWS and Microsoft Azure. The move to IaaS allows security teams to focus more on data protection since the security of networks, hardware, physical server locations, uptime, etc... can now be controlled more readily.

Read More

In EMEA, It's the Year of the Cloud

By Chantelle Patel  |  January 13, 2017 at 5:00 AM  | 

g96j64inrho-hector-martinez.jpgMigrating to the cloud is rapidly becoming top-of-mind for many European companies. More organizations are looking to cloud applications like Office 365 and G Suite to lower costs, improve employee productivity, and reduce maintenance burdens on IT staff.

Read More

Hackers Are Home For the Holidays

By Kevin Gee  |  December 13, 2016 at 6:10 PM  | 

shutterstock_520279837.jpgWith the holiday season already in full swing, people all across the world are sharing their personal and financial information with hundreds of retailers as they scramble to purchase gifts for family and friends. This makes it a perfect time to remember the countless company breaches over the past few holiday seasons and reflect on how enterprises can better protect Payment Card Industry data (PCI). Your employees and customers have enough to worry about without the additional concern that a breach may lead to information being exposed to malicious parties.  

Read More

what's so special about a CASB: part five

By Kevin Gee  |  November 23, 2016 at 10:30 AM  | 

Performance and Scalability

shutterstock_374127247.jpgCloud Access Security Brokers are becoming an integral piece of organizations’ cloud security strategies. In Part 1 we learned how businesses have evolved to become more mobile and thus required comprehensive data protection that extended beyond the cloud. In Part 2 we covered the importance of real-time inline data protection. In Part 3 we delved into the type of policies and controls organizations have at their disposal to protect data. We also covered our burgeoning UEBA features and patented encryption capabilities. In Part 4 we discussed out of band Breach Discovery which provides visibility into potential data exfiltration threats. Features and capabilities are key to an effective security solution, as well as deployability and scalability.

Read More