<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Cloud Security in 2018: What You Need to Know

By Rich Campagna  |  July 23, 2018 at 4:34 AM  | 

Cloud is the standard platform for performing work in 2018. Organizations are moving more of their applications to this new landscape every day. However, knowing how to secure SaaS apps like Office 365, IaaS offerings like AWS, and much more, can be a bit overwhelming – there are countless solutions that claim they can protect data in the cloud. Fortunately, the Next-Gen CASB is here to break it down for you. In this Glass Class, you can hear about the top security priorities for 2018 – from securing BYOD to protecting the long-tail of SaaS. Watch below to learn more.

Read More

The Great CASB: Part Four

By Jacob Serpa  |  September 8, 2017 at 5:00 AM  | 

Why You Don’t Need MDM

rawpixel-com-267082.jpgIn Part One, we discussed why you need a CASB in light of current business trends (cloud, BYOD, et cetera). In Part Two, we described the cybersecurity capabilities that companies need as they take advantage of the cloud. In Part Three, we detailed the mobile security tools companies need in order to protect their data in a modern, BYOD workplace.

Read More

Datawatch: Beware of Careless Insiders

By Jacob Serpa  |  August 16, 2017 at 12:36 PM  | 

samson-vowles-191386.jpgEvery day, employees around the world use the cloud to perform their jobs. With bring your own device (BYOD), workers are given dynamic data access to complete their work from unmanaged devices, remote locations, and unsafe WiFi. Due to the host of modern cloud applications, corporate information can be stored in more places and shared more widely than ever. Together, these trends of BYOD, remote data access, and widespread sharing put enterprise data in jeopardy.

Read More

The Great CASB: Part Three

By Jacob Serpa  |  August 11, 2017 at 6:00 AM  | 

What You Need For Mobile Security

mia-baker-322592.jpgIn Part Two, we discussed the capabilities needed for the cloud security of organizations operating in the modern business world. While these features are necessary, they are not sufficient for complete cybersecurity. As companies continue to embrace BYOD, employees will be making greater use of their personal mobile devices for work purposes. Because of this, enterprises must have security solutions that encompass mobile measures, as well. Fortunately, cloud access security brokers (CASBs) provide a number of features that can secure mobility.

Read More