<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">

Next-Gen CASB Blog

Agentless Mobile Security: No More Tradeoffs

By Kevin Lee  |  January 25, 2018 at 4:54 AM  | 

Screen Shot 2017-12-11 at 1.06.42 PM-1.png

Have you ever seen a "Pick two out of three” diagram? They present three concepts and force individuals to select the one that they see as the least important. The tradeoffs between convenience, privacy, and security serve as a perfect example of a "Pick two" situation for many mobile security solutions. 

Read More

The Great CASB: Part Four

By Jacob Serpa  |  September 8, 2017 at 5:00 AM  | 

Why You Don’t Need MDM

rawpixel-com-267082.jpgIn Part One, we discussed why you need a CASB in light of current business trends (cloud, BYOD, et cetera). In Part Two, we described the cybersecurity capabilities that companies need as they take advantage of the cloud. In Part Three, we detailed the mobile security tools companies need in order to protect their data in a modern, BYOD workplace.

Read More

EU: Companies Lack Unilateral Right to Monitor Employees

By Salim Hafid  |  September 5, 2017 at 4:58 PM  | 

EU.jpgIn a major victory for privacy advocates, Europe's Court of Human Rights has ruled on organizations' abilities to monitor employee communications with limited consent. While precedent set in 2016 gave employers blanket ability to monitor traffic "to verify that the employees are completing their professional tasks during working hours", the new decision means employers across Europe will have to significantly curtail their data collection initiatives.

Read More

Datawatch: Beware of Careless Insiders

By Jacob Serpa  |  August 16, 2017 at 12:36 PM  | 

samson-vowles-191386.jpgEvery day, employees around the world use the cloud to perform their jobs. With bring your own device (BYOD), workers are given dynamic data access to complete their work from unmanaged devices, remote locations, and unsafe WiFi. Due to the host of modern cloud applications, corporate information can be stored in more places and shared more widely than ever. Together, these trends of BYOD, remote data access, and widespread sharing put enterprise data in jeopardy.

Read More