<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

The Four Pillars of CASB: Visibility

By Juan Lugo | October 23, 2019 at 5:00 AM
4P_Visibility

Due to the potential for data leakage in the cloud, the use of CASBs (cloud access security brokers) is needed in order to maintain visibility over data that has gone beyond the reach of on-premises tools. Bitglass enables organizations to monitor cloud applications through one portal which offers complete oversight on all activities as well as thorough analytics.

 

Activity Logs

When it comes to sensitive data, an organization must have full visibility and knowledge over how it is being used. CASBs provide detailed logs on all cloud transactions, so any logins, uploads, or downloads are always recorded. App-specific behaviors such as external file sharing are also logged, helping organizations know the whereabouts of data if it is shared. These logs also allow IT teams to filter through them in order to gain more visibility into the activity within the enterprise.

Shadow IT 

Shadow IT, also known as unsanctioned applications, are classified according to risk – allowing organizations to decide what needs to be blocked. Traditional CASBs focus their resources on manually detecting and cataloging unsanctioned cloud applications. This is typically done through teams of people who scour the internet to reactively evaluate applications as they arise or are updated. However, leading CASBs focus on a more efficient approach with a system that automatically detects, scrutinizes, and classifies any application. This automated system, referred to as Zero-day Shadow IT Discovery, uses a machine learning approach to evaluate apps on the fly.

CSPM 

In addition to the above, cloud security posture management (CSPM) detects misconfigurations for infrastructure as a service (IaaS) platforms, which often require extensive configurations in order to make sure that they function properly. Having a strong cloud security posture on these platforms is a critical step to prevent data leakage. Storage solutions, like AWS for instance, have to be configured properly or it can result in sensitive data becoming publicly accessible. This is precisely what happened in the Capital One breach.  

Organizations utilizing CSPM enable themselves to identify and remediate any misconfigurations. The Bitglass CSPM solution can crawl IaaS instances and search for inconsistencies with custom benchmarks defined by your organizations. Moreover, Bitglass adheres to pre-established standards, such as HIPAA, PCI DSS, and CIS.To learn about cloud access security brokers (CASBs) and how they can protect your enterprise from data leakage, malware, and more, download the Top CASB Use Cases below.

Top CASB Use Cases