<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">

Next-Gen CASB Blog

Orbitz: Why You Can't Secure Data in the Dark

By Jacob Serpa  |  March 22, 2018 at 4:29 AM  | 

Cloud Computing Concept. The Future - Everything from Socket.jpeg

On March 1, 2018, Orbitz discovered that a malicious party may have stolen information from one of its legacy platforms. The compromised platform housed Orbitz customer information such as mailing addresses, phone numbers, email addresses, and full names, as well as details about nearly 900,000 payment cards. 

This breach highlights the struggle that many companies face on a day-to-day basis. 

Read More

What You Should Know When Moving to Office 365

By Mike Schuricht  |  March 14, 2018 at 4:23 AM  | 

When organizations deploy cloud applications, traditional, on-premises security solutions prove unable to provide comprehensive data protection. As Office 365 becomes increasingly common among businesses, they must rethink their security strategies and adopt next-gen solutions that can protect their data in the cloud. The below video discusses this journey to cloud apps like Office 365.

Read More

Shadow IT and the End of the Endless Race

By Paul Sullivan  |  March 12, 2018 at 4:16 AM  | 

Hand holding smartphone with colorful app icons concept.jpeg

Using shadow IT discovery is a great way to identify data leakage – but how can organizations be certain that it is effective? First-generation cloud access security brokers (CASBs) rely on manually curating lists of cloud apps in order to enable shadow IT discovery. Each app must be individually evaluated so that its level of risk can be identified. It must also be tied to domains and IP addresses so that it can be detected in network or proxy logs. Unfortunately, there are so many apps in existence that it is impossible to gather all of the necessary information manually. However, the Next-Gen CASB is automating this process to keep up with the ever-expanding number of cloud apps.

Read More

You Are the Weakest Link – Goodbye

By Jacob Serpa  |  February 26, 2018 at 5:24 AM  | 

close up of a broken chain and a paper clip on white background.jpeg

Security in the cloud is a top concern for the modern enterprise. Fortunately, provided that organizations do their due diligence when evaluating security tools, storing data in the cloud can be even more secure than storing data on premises. However, this does require deploying a variety of solutions for securing data at rest, securing data at access, securing mobile and unmanaged devices, defending against malware, detecting unsanctioned cloud apps (shadow IT), and more. Amidst this rampant adoption of security tools, organizations often forget to bolster the weakest link in their security chain, their users.

Read More