<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Cornerstone Capabilities of Cloud Access Security Brokers

By Jacob Serpa  |  January 2, 2019 at 4:40 AM  | 

Traditional security tools are not built to protect cloud data that is accessed from personal devices around the clock and around the world. With the rise of bring your own device (BYOD) and cloud-based tools like AWS, Office 365, and Salesforce, it can be challenging to figure out which technologies are needed to keep data safe. Fortunately, cloud access security brokers (CASBs) have arisen as the tools of choice for securing data wherever it goes. Want to know which kinds of CASB features are needed to protect your organization's sensitive information? Learn more by watching the below Glass Class.

Read More

Want to Secure Salesforce? No Problem!

By Mike Schuricht  |  September 6, 2018 at 5:08 AM  | 

Every day, more and more corporate information is moving to cloud applications like Salesforce. While these cloud-based tools provide organizations with increased flexibility, collaboration, and more, they can also lead to data leakage when not properly insulated from threats. Fortunately, advanced security solutions like cloud access security brokers (CASBs) can protect data in Salesforce through capabilities such as full strength encryption that preserves key functionality (search and sort). Learn more by watching the below Glass Class.

Read More

Where does Salesforce platform encryption fall short?

By Mike Schuricht  |  November 18, 2016 at 11:56 AM  | 

shutterstock_262316411.jpgSalesforce Shield (Salesforce’s platform encryption product) has now been on the market for about a year and a half. The goal is to encrypt data at rest in Salesforce with a bring your own key (BYOK) approach which was introduced in July. The solution sounds great, but doesn’t deliver on the main reasons you would want to encrypt cloud data in the first place.

Read More

what's so special about a CASB: part two

By Kevin Gee  |  October 19, 2016 at 6:00 AM  | 

 End-to-End Data Protection

photo-1422565167033-dec8fad92aba.jpegIn Part 1, we saw the need for security systems to evolve in order to meet an ever growing trend of work and data going mobile and moving outside the corporate network. Between the emerging cloud application space and employees’ desire to use their own devices, a traditional firewall isn’t enough to ensure data security or data compliance anymore. Many Cloud Access Security Brokers (CASBs) tackle this through the use of APIs to handle data-at-rest in the cloud or installed agents on devices to manage and protect the device.

Read More