<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Datawatch: Beware of Careless Insiders

By Jacob Serpa  |  August 16, 2017 at 12:36 PM  | 

samson-vowles-191386.jpgEvery day, employees around the world use the cloud to perform their jobs. With bring your own device (BYOD), workers are given dynamic data access to complete their work from unmanaged devices, remote locations, and unsafe WiFi. Due to the host of modern cloud applications, corporate information can be stored in more places and shared more widely than ever. Together, these trends of BYOD, remote data access, and widespread sharing put enterprise data in jeopardy.

Read More

The Great CASB: Part Three

By Jacob Serpa  |  August 11, 2017 at 6:00 AM  | 

What You Need For Mobile Security

mia-baker-322592.jpgIn Part Two, we discussed the capabilities needed for the cloud security of organizations operating in the modern business world. While these features are necessary, they are not sufficient for complete cybersecurity. As companies continue to embrace BYOD, employees will be making greater use of their personal mobile devices for work purposes. Because of this, enterprises must have security solutions that encompass mobile measures, as well. Fortunately, cloud access security brokers (CASBs) provide a number of features that can secure mobility.

Read More

The Great CASB: Part Two

By Jacob Serpa  |  August 3, 2017 at 12:00 PM  | 

How to Best Secure the Cloud

juliette-leufke-154599.jpgIn Part One, we discussed modern business trends like the move to the cloud, BYOD, the shared responsibility model of security, and how each of them necessitates the use of a cloud access security broker (CASB). CASB platforms typically leverage proxies and cloud apps’ APIs to protect data across cloud apps. CASBs that use forward and reverse proxies can monitor and data in real time, in transit, and on devices. Through API integration, CASBs can also take action, limiting access to sensitive data in some of these high-risk cloud apps. When used in tandem, proxies and APIs enable a number of capabilities for end-to-end cloud protection.

Read More

The Rise of the CASB

By Chantelle Patel  |  August 1, 2017 at 6:00 AM  | 

glenn-carstens-peters-203007.jpgThe cloud access security broker (CASB) market has changed drastically over the last few years. As more and more organizations move to the cloud and make use of cloud applications, they are faced with the reality that their IT departments are ultimately responsible for protecting data at rest in the cloud and on endpoints that have access to that data. Unfortunately, while many cloud apps feature improved infrastructure security and rapid application updates, gaps in native security features still exist. 

Read More