<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Want to Secure Salesforce? No Problem!

By Mike Schuricht  |  September 6, 2018 at 5:08 AM  | 

Every day, more and more corporate information is moving to cloud applications like Salesforce. While these cloud-based tools provide organizations with increased flexibility, collaboration, and more, they can also lead to data leakage when not properly insulated from threats. Fortunately, advanced security solutions like cloud access security brokers (CASBs) can protect data in Salesforce through capabilities such as full strength encryption that preserves key functionality (search and sort). Learn more by watching the below Glass Class.

Read More

Shield or Fig Leaf?

By Nat Kausik  |  May 18, 2018 at 11:13 AM  | 

figleaf

Global banking giant headquartered in Europe is rolling out Bitglass searchable encryption for their CRM application.   In contrast to their brethren this side of the pond, the bank refused to be strong-armed into native encryption from the SaaS vendor.  Intriguing.

Read More

Verizon Breach: How CASB Encryption Can Protect Your Data

By Chantelle Patel  |  July 17, 2017 at 2:40 PM  | 

clem-onojeghuo-181555.jpgAs has been widely reported, Verizon is the latest enterprise to be hit with a large-scale data breach. Over 14 million customer records were left exposed due to a misconfiguration in Verizon’s Amazon Web Services (AWS) instance. Among the leaked information were logs containing customer names, cell phone numbers, and account PINs. Had this data fallen into the hands of hackers, even the most security conscious users – those with two-step authentication enabled – could have been bypassed, allowing hackers to hijack a customer's account and phone number.

Read More

How Strong is Your Encryption System?

By Kevin Gee  |  August 15, 2016 at 12:30 PM  | 

Pasted_image_at_2016_08_15_11_49_AM.pngMany Cloud Access Security Brokers and even cloud vendors themselves provide their own form of data encryption. But in today’s connected world, it is not enough to just secure the data.  How do you encrypt the data? Are you using industry standards? Do you maintain application functionality? Who maintains the keys? These are all questions that you should be thinking about when you wish to secure your data in the cloud.

Read More