<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Glass Class: How to Detect Malware

By Will Houcheime  |  October 2, 2019 at 5:00 AM  | 

 

Malware can be a serious threat to organizations that don't have the proper security tools to protect against it. Some forms of malware can force enterprises to pay sums of dollars, freeze current operations, and more depending on the type of attack. To make matters worse, some malware attacks can lead to sensitive data being leaked, which has caused some companies to pay hundreds of millions of dollars in fines over the past few years. In our latest Glass Class, we discuss how to classify malware, and the type of tools organizations can use to put a halt to malicious attacks in real time.

Read More

Glass Class: The ZScaler and Bitglass Integration

By Will Houcheime  |  September 18, 2019 at 5:00 AM  | 

 

With the various tools used in today’s cloud-first world, it could be confusing for organizations to find the correct tools they need to protect sensitive data. In light of this, Bitglass and Zscaler have partnered with each other to provide a solution to create a safe zone for the use of unsanctioned cloud applications. To find out more about how the Bitglass cloud access security broker (CASB) integrates with the Zscaler secure web gateway (SWG), check out our latest Glass Class.

Read More

Global Visibility into your SaaS Applications

By Shane Moore  |  July 15, 2019 at 4:56 AM  | 
WorldMap

The first time I saw this graphic I was stunned, and so was the customer! What you are looking at is a view of all the Microsoft Office 365 logins for a large US-based organization after Bitglass was configured as a SAML (security assertion markup language) relay to their identity provider (IDP). All of this organization’s operations are based in the US, so there is no reason that anyone should log in from another country. This tells us that unauthorized users around the world somehow gained access to compromised usernames and passwords and proceeded to use them to log in.

Read More

How to Protect Data in a BYOD World

By Mike Schuricht  |  September 26, 2018 at 4:35 AM  | 

Every day, more and more corporate information is moving to employees' personal devices. This rise of BYOD (bring your own device) provides increased flexibility and productivity to employees and, consequently, the organizations for which they work. However, it also creates new cybersecurity concerns. Traditional tools built for corporate-owned, managed devices are not ideal for this new BYOD landscape. Learn more by watching the below Glass Class.

Read More