<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Cloud Access Security Brokers: Past, Present, and Future

By Jacob Serpa  |  December 6, 2017 at 6:03 AM  | 

Businessman hand working with a Cloud Computing diagram on the new computer interface as concept.jpeg

Leading cloud access security brokers (CASBs) currently provide data protection, threat protection, identity management, and visibility. However, this has not always been the case.  Since the inception of the CASB market, cloud access security brokers have offered a variety of tools and undergone a number of evolutions. For organizations to ensure that they are adopting the correct solutions and adequately protecting their data, they must understand the past, present, and future of CASBs. 

Read More

Insider Threats, Machine Learning, and the Next-Gen CASB

By Kevin Gee  |  November 30, 2017 at 6:06 AM  | 

Silhouette of human head with gears mechanism instead of brain.jpegOne of the biggest dangers to application security is that of the insider threat. This ranges from users who unknowingly expose credentials and sensitive data to external parties, to disgruntled employees who act against the company's interests. These threats are difficult to prevent with common security configurations and are big reasons why user and entity behavior analytics (UEBA) is such a common buzzword within the security industry.  

Read More

The Great CASB: Part Four

By Jacob Serpa  |  September 8, 2017 at 5:00 AM  | 

Why You Don’t Need MDM

rawpixel-com-267082.jpgIn Part One, we discussed why you need a CASB in light of current business trends (cloud, BYOD, et cetera). In Part Two, we described the cybersecurity capabilities that companies need as they take advantage of the cloud. In Part Three, we detailed the mobile security tools companies need in order to protect their data in a modern, BYOD workplace.

Read More

Datawatch: Beware of Careless Insiders

By Jacob Serpa  |  August 16, 2017 at 12:36 PM  | 

samson-vowles-191386.jpgEvery day, employees around the world use the cloud to perform their jobs. With bring your own device (BYOD), workers are given dynamic data access to complete their work from unmanaged devices, remote locations, and unsafe WiFi. Due to the host of modern cloud applications, corporate information can be stored in more places and shared more widely than ever. Together, these trends of BYOD, remote data access, and widespread sharing put enterprise data in jeopardy.

Read More