<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

At the Gartner Symposium, Office 365 looms large

By Salim Hafid  |  October 25, 2016 at 6:00 AM  | 

photo-1461214626925-421f126d9f11.jpegIt's always interesting to hear the insights of Gartner attendees, a high-level group that has a keen sense of what's needed in their organizations. At Bitglass, we're always looking to better understand our customers' top concerns, to see where the industry stands in terms of cloud adoption, and to discuss how a CASB fits into cloud security plans. Far and away the most popular topic of conversation was Office 365. For many, Office 365 deployments have already begun and CASB security was the organic next step. For others, the Gartner show served as an opportunity to meet with analysts and chart out a path for Office 365 migration.

Read More

The Data Blind Spot: Where O365 Security Falls Short

By Chantelle Patel  |  October 13, 2016 at 1:04 PM  | 

photo-1454165804606-c3d57bc86b40.jpeg

Over time, the number of enterprises migrating from their premises-based applications to cloud applications has dramatically increased. Surveys show that Office 365 is the leading SaaS productivity suite, far surpassing apps like G Suite and Box.

Read More

anomaly detection: a critical security component

By Shalmali Rajadhyax  |  August 10, 2016 at 12:30 PM  | 

photo-1453799527828-cf1bd7b2f682.jpegAnomaly detection is an important component of any security solution. Based off of data at login and user activity in the application post login, a complete solution can provide real-time alerts and enable IT to enforce actions when an anomalous event is detected.

Read More

Where Office 365 Falls Short in Securing PHI

By Mike Schuricht  |  August 8, 2016 at 11:49 AM  | 

10.jpg

Healthcare organizations struggle with BYOD security when they adopt cloud applications and are forced to figure out how to protect apps like Office 365. Securing Office 365 becomes even more difficult when medical practitioners work for multiple hospitals since only one mobile security solution, like an MDM, can be installed on a device at a time. However, this is only part of the problem. Securing protected health information (PHI), stored and shared by healthcare professionals, is the real challenge.

Read More