<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

The Great CASB: Part Four

By Jacob Serpa  |  September 8, 2017 at 5:00 AM  | 

Why You Don’t Need MDM

rawpixel-com-267082.jpgIn Part One, we discussed why you need a CASB in light of current business trends (cloud, BYOD, et cetera). In Part Two, we described the cybersecurity capabilities that companies need as they take advantage of the cloud. In Part Three, we detailed the mobile security tools companies need in order to protect their data in a modern, BYOD workplace.

Read More

EU: Companies Lack Unilateral Right to Monitor Employees

By Salim Hafid  |  September 5, 2017 at 4:58 PM  | 

EU.jpgIn a major victory for privacy advocates, Europe's Court of Human Rights has ruled on organizations' abilities to monitor employee communications with limited consent. While precedent set in 2016 gave employers blanket ability to monitor traffic "to verify that the employees are completing their professional tasks during working hours", the new decision means employers across Europe will have to significantly curtail their data collection initiatives.

Read More

Datawatch: Beware of Careless Insiders

By Jacob Serpa  |  August 16, 2017 at 12:36 PM  | 

samson-vowles-191386.jpgEvery day, employees around the world use the cloud to perform their jobs. With bring your own device (BYOD), workers are given dynamic data access to complete their work from unmanaged devices, remote locations, and unsafe WiFi. Due to the host of modern cloud applications, corporate information can be stored in more places and shared more widely than ever. Together, these trends of BYOD, remote data access, and widespread sharing put enterprise data in jeopardy.

Read More

The Great CASB: Part Three

By Jacob Serpa  |  August 11, 2017 at 6:00 AM  | 

What You Need For Mobile Security

mia-baker-322592.jpgIn Part Two, we discussed the capabilities needed for the cloud security of organizations operating in the modern business world. While these features are necessary, they are not sufficient for complete cybersecurity. As companies continue to embrace BYOD, employees will be making greater use of their personal mobile devices for work purposes. Because of this, enterprises must have security solutions that encompass mobile measures, as well. Fortunately, cloud access security brokers (CASBs) provide a number of features that can secure mobility.

Read More