<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Prasidh Srikanth

Recent Posts

Unsanctioned Apps in the Enterprise

By Prasidh Srikanth  |  February 11, 2019 at 4:54 AM  | 
Hand holding smartphone with media icons and symbol collection

Today, organizations leverage a plethora of software applications to enhance productivity, increase collaboration, and evolve their businesses. Some of these applications are IT approved and are purchased with a license by the organization at large; for example, Office 365, Slack, or Salesforce. These are referred to as licenced, managed, and sanctioned applications, but they all fall under the same app category (these titles can be used interchangeably).

Read More

Keeping Your Boat Afloat with a Cloud Access Security Broker

By Prasidh Srikanth  |  November 5, 2018 at 4:54 AM  | 

snow in Reine Village, Lofoten Islands, Norway

If you were on a sinking ship that was full of holes of various sizes, which ones would you patch first? Probably the big ones. Now, consider this: As an enterprise, you’ve been successfully sailing and securing your corporate data on premises for some time. However, now you’re migrating to the cloud, looking for increased productivity, collaboration, and cost savings. In this new ocean, organizations must decide how to prioritize security concerns so that they can prevent data leakage.

Read More

Cloud Access Security Brokers and Cyber Security Chicago

By Prasidh Srikanth  |  October 3, 2018 at 4:24 AM  | 

IMG_2440

Recently, Bitglass participated in the Cyber Security Conference in Chicago. At our booth, we were listening to customer stories about how they are strengthening their cybersecurity and adapting to changing technological trends; specifically, cloud and bring your own device (BYOD). Whether we spoke with universities or financial services organizations, everyone wanted to know more about the latest technology and how they should protect data as it moves beyond the corporate firewall.

Read More