<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

what's so special about a CASB: part five

By Kevin Gee  |  November 23, 2016 at 10:30 AM  | 

Performance and Scalability

shutterstock_374127247.jpgCloud Access Security Brokers are becoming an integral piece of organizations’ cloud security strategies. In Part 1 we learned how businesses have evolved to become more mobile and thus required comprehensive data protection that extended beyond the cloud. In Part 2 we covered the importance of real-time inline data protection. In Part 3 we delved into the type of policies and controls organizations have at their disposal to protect data. We also covered our burgeoning UEBA features and patented encryption capabilities. In Part 4 we discussed out of band Breach Discovery which provides visibility into potential data exfiltration threats. Features and capabilities are key to an effective security solution, as well as deployability and scalability.

Read More

what's so special about a CASB: part four

By Kevin Gee  |  November 15, 2016 at 12:00 PM  | 

 

Discovery Beyond Shadow IT

photo-1463310127152-33b375103141.jpegIn Part 3 we learned about Bitglass’ unique capabilities that protect your data in real-time, end-to-end. While in-band security is critical, CASBs aim to provide comprehensive data protection, which includes out-of-band threats. Bitglass’ Breach Discovery solution goes a step beyond identifying Shadow IT apps by detecting all data exfiltration threats, including malware hosts, anonymizers, TOR networks and phishing domains.

Read More

what's so special about a CASB: part two

By Kevin Gee  |  October 19, 2016 at 6:00 AM  | 

 End-to-End Data Protection

photo-1422565167033-dec8fad92aba.jpegIn Part 1, we saw the need for security systems to evolve in order to meet an ever growing trend of work and data going mobile and moving outside the corporate network. Between the emerging cloud application space and employees’ desire to use their own devices, a traditional firewall isn’t enough to ensure data security or data compliance anymore. Many Cloud Access Security Brokers (CASBs) tackle this through the use of APIs to handle data-at-rest in the cloud or installed agents on devices to manage and protect the device.

Read More

The Data Blind Spot: Where O365 Security Falls Short

By Chantelle Patel  |  October 13, 2016 at 1:04 PM  | 

photo-1454165804606-c3d57bc86b40.jpeg

Over time, the number of enterprises migrating from their premises-based applications to cloud applications has dramatically increased. Surveys show that Office 365 is the leading SaaS productivity suite, far surpassing apps like G Suite and Box.

Read More