<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

How to Protect Data in a BYOD World

By Mike Schuricht  |  September 26, 2018 at 4:35 AM  | 

Every day, more and more corporate information is moving to employees' personal devices. This rise of BYOD (bring your own device) provides increased flexibility and productivity to employees and, consequently, the organizations for which they work. However, it also creates new cybersecurity concerns. Traditional tools built for corporate-owned, managed devices are not ideal for this new BYOD landscape. Learn more by watching the below Glass Class.

Read More

Mobile Security in 2018 – It's Time to Evolve

By Salim Hafid  |  March 28, 2018 at 4:34 AM  | 

When organizations adopt cloud and allow employees to work from mobile devices, they need to begin securing their data in new ways. As corporate information flows to different types of endpoints, different types of tools are needed in order to protect it. It is time for the modern enterprise to evolve and make use of separate security solutions for managed and unmanaged devices – the two can no longer be treated in the same fashion. 

Read More

Agentless Mobile Security: No More Tradeoffs

By Kevin Lee  |  January 25, 2018 at 4:54 AM  | 

Screen Shot 2017-12-11 at 1.06.42 PM-1.png

Have you ever seen a "Pick two out of three” diagram? They present three concepts and force individuals to select the one that they see as the least important. The tradeoffs between convenience, privacy, and security serve as a perfect example of a "Pick two" situation for many mobile security solutions. 

Read More

The Great CASB: Part Four

By Jacob Serpa  |  September 8, 2017 at 5:00 AM  | 

Why You Don’t Need MDM

rawpixel-com-267082.jpgIn Part One, we discussed why you need a CASB in light of current business trends (cloud, BYOD, et cetera). In Part Two, we described the cybersecurity capabilities that companies need as they take advantage of the cloud. In Part Three, we detailed the mobile security tools companies need in order to protect their data in a modern, BYOD workplace.

Read More