<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Cornerstone Capabilities of Cloud Access Security Brokers

By Jacob Serpa  |  January 2, 2019 at 4:40 AM  | 

Traditional security tools are not built to protect cloud data that is accessed from personal devices around the clock and around the world. With the rise of bring your own device (BYOD) and cloud-based tools like AWS, Office 365, and Salesforce, it can be challenging to figure out which technologies are needed to keep data safe. Fortunately, cloud access security brokers (CASBs) have arisen as the tools of choice for securing data wherever it goes. Want to know which kinds of CASB features are needed to protect your organization's sensitive information? Learn more by watching the below Glass Class.

Read More

Reflections: Gartner Catalyst

By Jacob Serpa  |  August 28, 2017 at 6:00 AM  | 

Skyscrapers and the Children's Pond at sunset, in San Diego, California..jpegLast week, Bitglass participated in Gartner Catalyst, a conference designed to educate organizations’ technical staffs. Whether it was from conversations at Bitglass’ booth, or from Gartner and vendor speaking sessions, a number of trends consistently bubbled to the surface.

Read More

what's so special about a CASB: part three

By Kevin Gee  |  November 7, 2016 at 9:33 AM  | 

In-Line, Encryption, Identity Management. Oh My!

DeathtoStock_Creative Community5.jpgIn Part 1 of this series, we explored how cloud security has evolved to encompass cloud apps and unmanaged device access. In Part 2, we learned how Bitglass is the only Cloud Access Security Broker that can provide total data protection in-line and in real-time end-to-end (from the cloud application to any device). So what features does Bitglass provide? How do we actually protect data in the cloud?

Read More

anomaly detection: a critical security component

By Shalmali Rajadhyax  |  August 10, 2016 at 12:30 PM  | 

photo-1453799527828-cf1bd7b2f682.jpegAnomaly detection is an important component of any security solution. Based off of data at login and user activity in the application post login, a complete solution can provide real-time alerts and enable IT to enforce actions when an anomalous event is detected.

Read More