<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">

Next-Gen CASB Blog

Where does Salesforce platform encryption fall short?

By Mike Schuricht  |  November 18, 2016 at 11:56 AM  | 

shutterstock_262316411.jpgSalesforce Shield (Salesforce’s platform encryption product) has now been on the market for about a year and a half. The goal is to encrypt data at rest in Salesforce with a bring your own key (BYOK) approach which was introduced in July. The solution sounds great, but doesn’t deliver on the main reasons you would want to encrypt cloud data in the first place.

Read More

what's so special about a CASB: part two

By Kevin Gee  |  October 19, 2016 at 6:00 AM  | 

 End-to-End Data Protection

photo-1422565167033-dec8fad92aba.jpegIn Part 1, we saw the need for security systems to evolve in order to meet an ever growing trend of work and data going mobile and moving outside the corporate network. Between the emerging cloud application space and employees’ desire to use their own devices, a traditional firewall isn’t enough to ensure data security or data compliance anymore. Many Cloud Access Security Brokers (CASBs) tackle this through the use of APIs to handle data-at-rest in the cloud or installed agents on devices to manage and protect the device.

Read More

The Data Blind Spot: Where O365 Security Falls Short

By Chantelle Patel  |  October 13, 2016 at 1:04 PM  | 


Over time, the number of enterprises migrating from their premises-based applications to cloud applications has dramatically increased. Surveys show that Office 365 is the leading SaaS productivity suite, far surpassing apps like G Suite and Box.

Read More

what's so special about a CASB: part one

By Kevin Gee  |  October 5, 2016 at 6:00 AM  | 

The Evolution of Security


How often do your employees or coworkers work from home?  How about from Starbucks? Hotels? Airports? What devices are they using?  Are they only checking email while on their phone, or are they working on sensitive documents as well?  Do they happen to use personal tablets, laptops, or desktops?

Read More