<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">

Next-Gen CASB Blog

Reaching HIPAA Compliance With Bitglass

By Jacob Serpa  |  September 13, 2017 at 5:30 AM  | 

ken-treloar-365804.jpgThe Health Insurance Portability and Accountability Act, or HIPAA, is a U.S. law critical for healthcare organizations. The law aims to safeguard protected health information, or PHI, which is any data that uniquely identifies an individual. PHI can take the form of social security numbers, medical record numbers, license plate numbers, and more. It must be protected by virtually any entity that handles it in relation to healthcare.

Read More

Where does Salesforce platform encryption fall short?

By Mike Schuricht  |  November 18, 2016 at 11:56 AM  | 

shutterstock_262316411.jpgSalesforce Shield (Salesforce’s platform encryption product) has now been on the market for about a year and a half. The goal is to encrypt data at rest in Salesforce with a bring your own key (BYOK) approach which was introduced in July. The solution sounds great, but doesn’t deliver on the main reasons you would want to encrypt cloud data in the first place.

Read More

The Necessity of Secure File Sharing

By Mike Schuricht  |  October 28, 2016 at 6:00 AM  | 

photo-1474403078171-7f199e9d1335.jpegAdoption of cloud Enterprise File Sync and Share (EFSS) solutions is happening at a staggering pace in 2016. Companies have many options when deciding which solution to deploy, ranging from dedicated services like Box and Dropbox to more full-featured cloud productivity suites that count EFSS as a component of their feature-set, like Office 365, OneDrive/Sharepoint, and G Suite. Regardless which EFSS solution is chosen, there is always a concern around cloud security.

Read More

How Strong is Your Encryption System?

By Kevin Gee  |  August 15, 2016 at 12:30 PM  | 

Pasted_image_at_2016_08_15_11_49_AM.pngMany Cloud Access Security Brokers and even cloud vendors themselves provide their own form of data encryption. But in today’s connected world, it is not enough to just secure the data.  How do you encrypt the data? Are you using industry standards? Do you maintain application functionality? Who maintains the keys? These are all questions that you should be thinking about when you wish to secure your data in the cloud.

Read More