<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">

Next-Gen CASB Blog

The Great CASB: Part Four

By Jacob Serpa  |  September 8, 2017 at 5:00 AM  | 

Why You Don’t Need MDM

rawpixel-com-267082.jpgIn Part One, we discussed why you need a CASB in light of current business trends (cloud, BYOD, et cetera). In Part Two, we described the cybersecurity capabilities that companies need as they take advantage of the cloud. In Part Three, we detailed the mobile security tools companies need in order to protect their data in a modern, BYOD workplace.

Read More

Datawatch: Beware of Careless Insiders

By Jacob Serpa  |  August 16, 2017 at 12:36 PM  | 

samson-vowles-191386.jpgEvery day, employees around the world use the cloud to perform their jobs. With bring your own device (BYOD), workers are given dynamic data access to complete their work from unmanaged devices, remote locations, and unsafe WiFi. Due to the host of modern cloud applications, corporate information can be stored in more places and shared more widely than ever. Together, these trends of BYOD, remote data access, and widespread sharing put enterprise data in jeopardy.

Read More

The Great CASB: Part Three

By Jacob Serpa  |  August 11, 2017 at 6:00 AM  | 

What You Need For Mobile Security

mia-baker-322592.jpgIn Part Two, we discussed the capabilities needed for the cloud security of organizations operating in the modern business world. While these features are necessary, they are not sufficient for complete cybersecurity. As companies continue to embrace BYOD, employees will be making greater use of their personal mobile devices for work purposes. Because of this, enterprises must have security solutions that encompass mobile measures, as well. Fortunately, cloud access security brokers (CASBs) provide a number of features that can secure mobility.

Read More

The Great CASB: Part Two

By Jacob Serpa  |  August 3, 2017 at 12:00 PM  | 

How to Best Secure the Cloud

juliette-leufke-154599.jpgIn Part One, we discussed modern business trends like the move to the cloud, BYOD, the shared responsibility model of security, and how each of them necessitates the use of a cloud access security broker (CASB). CASB platforms typically leverage proxies and cloud apps’ APIs to protect data across cloud apps. CASBs that use forward and reverse proxies can monitor and data in real time, in transit, and on devices. Through API integration, CASBs can also take action, limiting access to sensitive data in some of these high-risk cloud apps. When used in tandem, proxies and APIs enable a number of capabilities for end-to-end cloud protection.

Read More