How It Works
All Cloud Apps
All Cloud Apps
Managed App Security
Unmanaged App Security
the bitglass blog
Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks
Bitglass Rising: 2017 and Beyond
Next-Gen CASB: An ounce of prevention worth a pound of cure
Bitglass the Sole Visionary in Gartner Magic Quadrant for CASB
Private App Cloud Migration Requires CASB
The Robots are Here!
Cloud Access Security Brokers: Past, Present, and Future
Saturday Morning Security Spotlight: Apple, Breaches, and Leaks
Insider Threats, Machine Learning, and the Next-Gen CASB
Mission Impossible: Rogue Cloud Apps
Can a CASB Thwart the Uber Hack?
CASBs in K12: Agents Need Not Apply
Reflections: Gartner Symposium Barcelona
Zero-Day Read-Only Cloud App Protection
Saturday Morning Security Spotlight
Is 2018 the End of the API-Only CASB?
Next-Gen CASB: Zero-Day Protection
Exact Match Cures Healthcare's DLP Woes
CASBs and the Long Tail of SaaS
Identity and Authentication in a BYOD World
Security Rundown: Bad Rabbit, Malware-laden docs, and more
Avoid a Breach: 5 Tips to Secure Data Access
Office 365 Security Licensing Demystified
Secure Mobility Without MDM Headaches
CASB For Hire
Agentless CASB, FTW
CASB: Come for O365, Stay for Any App
Data Games: Security Insights from the Experts
CASBs: Top of the Class in Higher Ed
Second Gen CASBs Take the Lead
Reaching HIPAA Compliance With Bitglass
The Great CASB: Part Four
EU: Companies Lack Unilateral Right to Monitor Employees
Reflections: Gartner Catalyst
Bitglass Survey: 30% Take over 24 Hours for Breach Response
Datawatch: Beware of Careless Insiders
The Great CASB: Part Three
The Great CASB: Part Two
The Rise of the CASB
The Great CASB: Part One
Verizon Breach: How CASB Encryption Can Protect Your Data
Agentless CASB Accelerates Ransomware Disaster Recovery
Glass Class: The Malware Maze
passing the baton...
Gartner: CASBs Still Reign as Top Security Tech
Backdoor for Malware?
Are Your Sync Clients Really Safe?
Bitglass Top CASB on CBInsights
Fast and Frenzied Cloud Adoption
CASB, no bull
The cloud is rough on legacy security...
Malware: Painting a Picture Part 2
Secure Data Lakes?
GDPR Waits for No Company
Malware: Painting a Picture
AirPods and CASBs
repeal and replace
O365 Native Security - Wanna get away?
CASB RFP: Questions to ask when securing the cloud
Deploying Office 365? Here's what you need to know.
How One Company Thwarted an Office 365 Account Hijack with a CASB
VCR flashing 12.00?
there may be a shark circling your data
the cure for infectious malware
why free software is like a free puppy...
Why agentless CASBs rule!
Why You Need A CASB for GDPR Compliance
How to Save $2.04M on Secure Office 365
The white flag & AJAX-VM
The $650,649 iPhone Heist
CASB is Eating the MDM Market
Bringing Advanced Threat Protection to the Cloud
The View from RSA 2017
Cloud Security Requires Separation of Duties
Malware Waits for No CASB
CASB is Eating the IDaaS Market
AWS Support is Here
What's wrong with agents? Everything.
Enabling External Collaboration with a CASB
real-time agentless data protection
How Google Secures G Suite Data
In EMEA, It's the Year of the Cloud
2017 is here. Here's what infosec leaders expect.
In Healthcare, mobility is everything
Replacing MSFT Forefront TMG with a CASB
Limitations of Office 365 Data Loss Prevention (DLP)
Hackers Are Home For the Holidays
Agent-based CASB on Google Apps?
Cloud adoption is up again this year. What does that mean for you?
what's so special about a CASB: part five
Where does Salesforce platform encryption fall short?
what's so special about a CASB: part four
what's so special about a CASB: part three
Microsoft Teams vs Slack Security
Adding UEBA and Step-up 2FA to Cloud Apps
The Necessity of Secure File Sharing
At the Gartner Symposium, Office 365 looms large
denial, anger, bargaining, depression & acceptance...
DLP - need steak with the sizzle?
what's so special about a CASB: part two
The Data Blind Spot: Where O365 Security Falls Short
what's so special about a CASB: part one
who's viewing my docs at strange locations?
Ahead of Dreamforce, things to know about Salesforce security
What is UEBA?
the yugo of CASB?
Moving to the cloud? Here's why you need cloud DLP.
Integrating a CASB with Premises DLP
Federal court rules BYOD agents may constitute wiretapping
CASBs in Healthcare
How Strong is Your Encryption System?
anomaly detection: a critical security component
Where Office 365 Falls Short in Securing PHI
4 Risky Habits of BYOD Users
Capabilities Necessary for Complete Cloud Security
Closing the Cloud Security Gap with a CASB
CASB: Security AND Management
Should your Investment Firm fight for you?
The Evolution of Cloud Security Perceptions
Where to Start with CASB Policies?
Five Ways to Tell if Your CASB will Fly
8 Questions to Ask When Evaluating a CASB
6 ways MDM can be misused
"Cadillac of CASB" 0 - deploy in 2.4 months
4 Tips for Encrypting Google Drive
Securing Office 365 with a Cloud Access Security Broker
Adopting MDM may be sacrificing more privacy than employees realize
"the cadillac of CASB"
the ultimate trojan horse?
"Security is now a business issue"
Sandwiches, Prescription Drugs & CASB
who uses unmanaged devices?
Bluecoat + Symantec: dinosaurs' union?
How Enterprise Mobility Management (EMM) Can Annoy Users
How Cloud Data Leaks
Can cloud apps be as secure as premises-based apps?
Is OEM Software a Good Idea?
IT purchase decisions made easy
Peak MDM has come & gone, enter CASB
Bitglass Q&A: Securing Mobile with a CASB
how to start securing office 365
Bitglass report: BYOD availability outpaces adoption
Praise for secure native email on Blackberry
The best B2B digital marketing campaigns of 2016
Controlling External File Sharing with a CASB
Bitglass adds Help Desk Diagnostics
The Bitglass Story
The Tail wags the Dog?
The View from RSA 2016
Project Cumulus: Hackers' Unusual Activity
Security and Compliance for Healthcare
A look back at the original Where's Your Data experiment
On the Dark Web, Hackers Eager to Share Tactics
Apple Debate Highlights Importance of Data Encryption
Credentials spread like wildfire in Project Cumulus data experiment
Unmanaged Device Access Control with a CASB
Encrypting Salesforce in 5 Minutes with a CASB
Improving Office 365 Performance with a CASB
How Bitglass Works
Why do hackers target healthcare data?
One in three Americans were affected by healthcare breaches in 2015
Cloud Security Responsibilities: The Wall Street Journal Test
Who Should Use Bitglass?
Cloud adoption in regulated vs unregulated industries
Education is moving to the cloud faster than any other industry
"Where's Your Data?" Experiment
Cloud adoption on the rise. Many don't follow security best practices
Secure A Cloud App in 5 Minutes
The Whole Enchilada (aka CASB)
77% Plan To Increase Mobile & Cloud Security Spend
Nasdaq: Cloud & Mobile are Inseparable...
The Four Pillars of CASBs
Cloud First, Security Now
Survey: Access Permissions Are IT Leaders' Biggest Concern
The Dangers of Proprietary CASB Architectures
Tokenization for Cloud like Chocolate for Dogs?
CASBs Hit the Mainstream!
SaaS Encryption Gotchas
And the Next Major Data Breach is...
Concerned About CISA? Encrypt Data Before It Hits The Cloud
CASBs: A better approach to cloud encryption
Top Priorities in Higher Ed: Protect Research, Enable Cloud & Mobile
Catch & Release Phishing
Office 365 Security - Data Leakage Prevention
How to Patent a Phishing Attack
Office 365 Security - Mobile Data Protection
BYOD Security 2015: Rise of the Employees
Office 365 Security - Identifying Suspicious User Behavior
Office 365 Security - Controlling Identity Sprawl
The Definitive Guide to Office 365 Security
CASBs Explained! Comic Strip Edition
Boardroom Heroes: Part 3 (Finale) – CASBs
Boardroom Heroes: Part 2 – Prepping for 2016’s User Revolt
BYOD Done Right
2015 Cloud Adoption Report - Behind the Stats
Boardroom Heroes: Part 1 – The Rise Of IT Security
Security Is Everyone's Responsibility
The Spider-Man CASB!
Firsthand Account: Employee BYOD Fears
This is How Cloud Data Leaks
Will My Employer Keep My Personal BYOD Info Private?
Is Your Company Still Trying to Use MDM for BYOD?
EMM & BYOD - Oil and Water!
‘It’s An Adoption, Not A Roll Out’
Preventing Man-in-the-Cloud Attacks with a CASB
Your Data or Your Life! MDM Installation Warning
How Bitglass Provides Searchable, Sortable Encryption for Cloud Apps
MDM is Dead Part II
2015 BYOD Security Survey - Calling all IT security Pros
Salesforce "Platform Encryption"
Delivering Industry's First & Only Complete CASB
The Art of (Cyber) War
Hybrid Architecture Cloud Access Security Brokers
Full-strength, searchable cloud encryption
MDM is Dead, According to End-Users
Demystifying the Myths Surrounding CASBs
Mobile Security - Insider Threats, Swift Key & Zombie Apps
MDM: The Patriot Act of BYOD Programs
Making Security Invisible
6 Security Tips From the Gartner Security & Risk Management Summit
Those Who Can, Do
The Many Faced Cyber Criminal
Can MDM Secure the Mobile Cloud?
Future of the Data Center Firewall - Introducing the Cloud-tuple
Gartner Insight on CASBs - Proxy vs API Approaches
Healthcare Duped By “Spellcheck” Phishing Attack Again?
How Bitglass Authentication Works
Lifehack: 4 Things To Stop Doing when it comes to O365 Security
Teaming Up With FS-ISAC In The War Against Cyber Crime
Innovation Happens in So Many Ways
Here's How Nasty "Rombertik" Malware Evades Detection
HIPAA-Compliant BYOD After the Honeymoon
ShadowIT - The Blind leading the Blind?
Notes from RSA
Think Like a Hacker
Where's Your Data? Experiment
Cloud Access Security Brokers: What Gartner Is Saying
Global Warming to Put an End to Cloud Adoption
BYOD Security - The "Managed vs. Unmanaged" Device Strategy
Premera Breach Shows Striking Similarities to Anthem
Cloud Security Alliance CEO Jim Reavis talks cloud adoption
Security Still Cloud's Achilles Heel
Swiss Cheese and MDM: The Fallacy of Cross Platform Support
Adopt The ‘Assume Mentality’ When it comes to Breaches
Security's House Of Cards
Criminals Can Get Into Your Network Without Hacking You
The Encryption Bandaid
What The Anthem Breach Means For Healthcare Security
The Mobile Barn Door
Cutting Out The Security Blind Spots
"You will get a Data Breach, Period"
Limit the Damage - Catch Breaches Early
The Truth About Encryption
The Great Security Masquerade
Anytime, Anywhere Healthcare Data Access: Worth The Risk, or Not?
The Intricacies of Insider Threats
How Does an "Outsider" Become an "Insider" Threat?
How To Protect Your Data From Wall St. Lingo, Phony Emails & Tor
Tiny Budgets & Big Responsibility – Equipping Your Cyber Security Army
Where's Your Data?
The Human Factor Of Data Security
What "The Walking Dead" and IT Security Have In Common
What’s Lurking On Your Trusted Device?
5 Tips For Healthcare Data Security
What California’s Data Breach Report Means For Healthcare
The Nightmare Before Bitglass
What Did Data Say To The Device? - "It's Not You, It's Me"
The Deadliest Warrior – BYOD Edition - MDM vs. CASB
California’s New “Gold Rush” – Data Protection
Protecting The Black Market’s Hottest Commodity – Medical Data
7M Dropbox Passwords Breached - What It Means for the Enterprise
SaaS Holes - Part 4: Lost Mobile Devices
SaaS Holes - Part 3: Data Leakage
SaaS Holes - Part 2: Suspicious Activity
Here's How Bay Cove Human Services Eliminated MDM and IAM
SaaS Holes - Part 1: Identity Sprawl
Cloud and Trust: A Match Made In IT Heaven
Taming Shadow IT with Bitglass Cloud Discovery
Does Your Salesforce Sandbox Need a Cover?
Malware Stealing Salesforce Data
How to Leverage Legacy DLP for Cloud Apps (Users will Hate You)
Cloud Access Security Brokers - Wrap-Up
Cloud Access Security Broker Proxy Architectures
CASBs: Protecting Data "On the Network"
Protecting Data "On the Device" with a CASB
Smartphone Kill Switch Won't Help BYOD Security
Protecting Data "At Access" with a CASB
Protecting Data "In the Cloud" with a CASB
Total Data Protection with CASBs
CASBs Must Balance IT Needs and Employee Demands
Wait, Aren't Cloud Apps Already Secure?
The Definitive Guide to Cloud Access Security Brokers
You are Wasting Your Time on Cloud Security
Who Leaked that Spreadsheet onto Dropbox?
Here's why IT is resistant to change
Public Cloud Flexibility Meets Private Cloud Security
Dogfooding at Bitglass: We Secure Our Own Corporate Data
Data Security is the New Data Security
Incinerating Smartphones with Sensitive Data
Is User Experience The Most Important Aspect of BYOD Security?
Microsoft Signals the Cloud Adoption Tipping Point
4 Security Functions You Need When Deploying Salesforce
Last Minute Mother's Day Gift Idea: Cloud Security
More IT Security Pros Need to Think Like This Guy
Confessions of 100 Chief Information Security Officers
Who Knew BYOD Meant So Many Things?
The Cost of PHI on Employee Mobile Devices? $2,000,000+
BYOD or BYOB?
Here's what you need to know about securing Office 365
The most important aspect of Cloud Security? Mobile.
Next-Gen BYOD Requirement 6 of 6: Can I Get Some Privacy in Here?
Next-Gen BYOD Requirement 5 of 6: Be a People Pleaser
The Ultimate Cheat Sheet for Google Apps Security
Next-Gen BYOD Requirement 4 of 6: It's All About the Benjamins
Information-centric cloud security
The Perils of BYOD: Lose Your Phone, Get Fired!
Next-Gen BYOD Requirement 3 of 6: Clouds on the Horizon
WSJ: Privacy & the Rise of the Two Phone Employee
NSA announces "Activity-Based Marketing Platform"
Next-Gen BYOD Requirement 2 of 6: I want more
Do employees deserve privacy?
Next-Gen BYOD Requirement 1 of 6: It’s all about data
A Knife Fight in a Phone Booth: How we got from BY-Oh-NO to BYOD
Here's Why Your BYOD Program Will Fail
Dump your MDM! BYOD strategies that work
Tug of War! Security vs. Convenience
Users, IT, and BYOD Security: Can't We All Just Get Along?
Cloud Security and Employee Privacy: Why It Matters
BYOD Security: When MDM Doesn't Hit the Spot
The Perils of Agents: Change Jobs, Get Your Phone Wiped!
What CIOs are Concerned About After NSA-Cyber-Spying News
Mobile and Cloud Security Predictions for 2014
The Most Disruptive Technology Yet - How IT is Handling It
This is how long it takes to crack your CEO’s smartphone code…
Offense Wins Games, Defense Wins Championships
People-Centric SaaS Security
SaaS Security Doesn't Stop at the Cloud Infrastructure
Leaky Bucket Effect on Your BYOD & SaaS Security Policies
Welcome Michael Leigh!
Is Mobile Application Management Dead On Arrival?
Learnings from Week 2 of the Bitglass Beta: No Dragnets Please!
Login and Logout but Nothing in Between - SaaS Application Visibility
Bitglass Beta Week 1: Users Love Mobility, Hate MDM
Does Your Firewall Cover Your SaaS?
Your Data Has Left The Building
SUBSCRIBE TO OUR BLOG
Cloud Application Security,
Cloud Data Protection
Cloud Apps and BYOD
Office 365 Security
Cloud Security Gateway
advanced threat protection
Enterprise Mobility Management
SaaS Application Visibility
Next Gen CASB
SaaS Application Audit
Any Cloud App
How It Works
Cloud Access Security Broker
Data Loss Prevention
Events & Webinars
Connect With Us
© 2017 Bitglass, Inc.