<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Second Gen CASBs Take the Lead

By Mike Schuricht  |  September 15, 2017 at 11:28 AM  | 

alesia-kazantceva-283291.jpgInterest in cloud security continues to increase as enterprises move to adopt cloud applications, with cloud access security brokers becoming the de facto security choice. Agile, cloud-first organizations are leading the charge to these more flexible applications, but now, large, security conscious, regulated companies are also going cloud. Security is a key pillar for all that adopt these apps.

Read More

EU: Companies Lack Unilateral Right to Monitor Employees

By Salim Hafid  |  September 5, 2017 at 4:58 PM  | 

EU.jpgIn a major victory for privacy advocates, Europe's Court of Human Rights has ruled on organizations' abilities to monitor employee communications with limited consent. While precedent set in 2016 gave employers blanket ability to monitor traffic "to verify that the employees are completing their professional tasks during working hours", the new decision means employers across Europe will have to significantly curtail their data collection initiatives.

Read More

Reflections: Gartner Catalyst

By Jacob Serpa  |  August 28, 2017 at 6:00 AM  | 

Skyscrapers and the Children's Pond at sunset, in San Diego, California..jpegLast week, Bitglass participated in Gartner Catalyst, a conference designed to educate organizations’ technical staffs. Whether it was from conversations at Bitglass’ booth, or from Gartner and vendor speaking sessions, a number of trends consistently bubbled to the surface.

Read More

Bringing Advanced Threat Protection to the Cloud

By Salim Hafid  |  March 3, 2017 at 7:00 AM  | 

malware-image.png

 Threats to corporate data are growing at a rapid pace, particularly with malware and ransomware becoming more sophisticated. The potential for a zero-day attack to compromise your endpoints, cloud apps, and more is very high. In fact, more endpoints are at risk now with the popularity of Bring Your Own Device (BYOD) than ever before. This shift toward cloud and mobile is continuously changing the way IT departments think about threat protection.

Read More