<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Bitglass Rising: 2017 and Beyond

By Dean Hickman-Smith  |  December 14, 2017 at 5:13 AM  | 

Rear view of businessman standing near ladder going high in sky.jpeg

Over the last year, Bitglass has grown tremendously. We’ve traveled hundreds of thousands of miles to speak with cloud security thought leaders, interviewed hundreds of people, and recruited outstanding professionals to open operations in Europe, Asia, Australia, and Latin America - not to mention our expanding US team. We’ve signed and enabled sixty-eight channel partners and launched major initiatives with Singtel, Optus, Cylance, and Boldon James. Soon we will be adding another significant ecosystem partner that will give us access to over 400 additional sellers.

Read More

Reflections: Gartner Symposium Barcelona

By Dean Hickman-Smith  |  November 21, 2017 at 6:01 AM  | 

Gartner Sym Barcelona.jpg

Bitglass just attended the Gartner Symposium conference in Barcelona. Despite concerns that cloud is not yet top of mind for organizations in Spain, the number of conference attendees indicated otherwise. Bitglass' VP of Europe (Eduard Meelhuysen) and I made a point to walk around the show floor to assess the current state of cloud. Clearly, demand for cloud security is a global phenomenon. 

Read More

what's so special about a CASB: part five

By Kevin Gee  |  November 23, 2016 at 10:30 AM  | 

Performance and Scalability

shutterstock_374127247.jpgCloud Access Security Brokers are becoming an integral piece of organizations’ cloud security strategies. In Part 1 we learned how businesses have evolved to become more mobile and thus required comprehensive data protection that extended beyond the cloud. In Part 2 we covered the importance of real-time inline data protection. In Part 3 we delved into the type of policies and controls organizations have at their disposal to protect data. We also covered our burgeoning UEBA features and patented encryption capabilities. In Part 4 we discussed out of band Breach Discovery which provides visibility into potential data exfiltration threats. Features and capabilities are key to an effective security solution, as well as deployability and scalability.

Read More