blog-banner.jpg

Total Cloud Security Blog

Stop Misconfigurations with Bitglass SaaS Security Posture Management (SSPM)

By Jeff Birnbaum  |  April 6, 2021 at 5:00 AM  | 
3 logos

SaaS has many advantages over on-premises software deployments, including lower upfront costs, quick setup and deployment, and accessibility from any device with a browser and internet connectivity. Because of this, organizations rely on SaaS to run their operations. Yet a single misconfiguration of your SaaS could lead to data theft or malicious data corruption. For example, not configuring the requirement for complex passwords can make a brute force attack on a SaaS account login more likely to succeed. Or improper file restrictions may make data available for users who should not have access to it. That is why organizations need a SaaS security posture management (SSPM) solution.

Read More

Learn What Your Peers Are Thinking in Bitglass’ 2021 Remote Work Security Report

By Jeff Birnbaum  |  March 30, 2021 at 5:00 AM  | 
remote-work-blog-crop

Today we released our 2021 Remote Workforce Security Report. We surveyed 287 IT and security professionals to understand how remote work has transformed the state of security operations over the last year. 

Read More

How to Quickly Integrate your SD-WAN with Bitglass

By Amit Singh  |  March 9, 2021 at 5:00 AM  | 
Bitglass SD-WAN

As the only SASE platform built on a Polyscale public cloud architecture, Bitglass leverages AWS Transit Gateway Connect to seamlessly integrate with SD-WAN solutions. Traffic from branch routers is seamlessly routed to Bitglass for real-time security. This flexible, plug-and-play approach is markedly different from that of competitors, who are limited to specific SD-WAN partners for whom they build and maintain piecemeal integrations.

Read More

Customer Spotlight: Managing Uploads to Non-Traditional Applications

By Nate Springer  |  March 4, 2021 at 4:59 AM  | 
mobile-apps

2020 was a challenging year for cybersecurity teams. They had to secure an unexpected shift to remote work in a matter of days, respond to a surge in BYOD usage, and maintain secure operations without physical access to the resources that they typically use--all without compromising productivity or performance.

Read More
FOLLOW US

BLOG TOPICS

see all