Total Cloud Security Blog

Why Forego Health: WFH Securely through the Cloud

By Samantha Nguyen  |  March 26, 2020 at 5:00 AM  | 
Businessman working with a Cloud Computing diagram on the new computer interface

Companies across all verticals are facing the unfortunate reality of the current situation. Cautionary measures to flatten the curve have prompted a rapidly growing number of employees to join the Work From Home (WFH) culture. Although fortunate enough to be able to WFH, the security of organizations is now at an increased risk of being compromised due to the heavy traffic flowing in and out of the cloud. 

Read More

Don’t Take Our Word for It – Listen to Our Customers

By Juan Lugo  |  March 18, 2020 at 5:00 AM  | 
Voice of the Customer
Gartner’s Voice of the Customer series (which to date (since October 2015) has featured well over 320,000 reviews across more than 330 markets), has played a key role in educating organizations about the tools that they are considering deploying. We believe it provides IT teams with in-depth and unbiased evaluations from real customers so that they can select the solutions that are the best fits for their organizations. The latest market to be added to Gartner’s collection is that of cloud access security brokers (CASBs).

Read More

Leading Analyst Overheard: Bitglass SmartEdge Tech is SASE on Steroids

By Prasidh Srikanth  |  March 11, 2020 at 5:00 AM  | 
Elegant hand holding tablet with virtual database and network concept

Applications moving to the cloud and increased user mobility are changing the way networking and network security services are delivered. We at Bitglass firmly believe that the future of network security is in the cloud and cloud access security brokers (CASBs) have been driving this change over the last few years. With the introduction of the concept of SASE (secure access service edge), Bitglass takes it a step further in redefining the way security is delivered.

Read More

How to Retain the Right Kinds of Control in the Cloud

By Jacob Serpa  |  February 24, 2020 at 5:00 AM  | 
Man holding hologram projection displaying cloud technology symbols

The last several years have seen an unprecedented shift in the way that businesses conduct their operations and employees perform their work. Users are no longer confined to working on premises from desktop computers. Data is being accessed, stored, shared, and processed in new ways. While these changes have enhanced productivity and collaboration in the enterprise, organizations must consider how they are affecting cybersecurity.

Read More