<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

the bitglass blog

Reflections: Gartner Catalyst

By Jacob Serpa  |  August 28, 2017 at 6:00 AM  | 

Skyscrapers and the Children's Pond at sunset, in San Diego, California..jpegLast week, Bitglass participated in Gartner Catalyst, a conference designed to educate organizations’ technical staffs. Whether it was from conversations at Bitglass’ booth, or from Gartner and vendor speaking sessions, a number of trends consistently bubbled to the surface.

Read More

At the Gartner Symposium, Office 365 looms large

By Salim Hafid  |  October 25, 2016 at 6:00 AM  | 

photo-1461214626925-421f126d9f11.jpegIt's always interesting to hear the insights of Gartner attendees, a high-level group that has a keen sense of what's needed in their organizations. At Bitglass, we're always looking to better understand our customers' top concerns, to see where the industry stands in terms of cloud adoption, and to discuss how a CASB fits into cloud security plans. Far and away the most popular topic of conversation was Office 365. For many, Office 365 deployments have already begun and CASB security was the organic next step. For others, the Gartner show served as an opportunity to meet with analysts and chart out a path for Office 365 migration.

Read More

The Data Blind Spot: Where O365 Security Falls Short

By Chantelle Patel  |  October 13, 2016 at 1:04 PM  | 

photo-1454165804606-c3d57bc86b40.jpeg

Over time, the number of enterprises migrating from their premises-based applications to cloud applications has dramatically increased. Surveys show that Office 365 is the leading SaaS productivity suite, far surpassing apps like G Suite and Box.

Read More

anomaly detection: a critical security component

By Shalmali Rajadhyax  |  August 10, 2016 at 12:30 PM  | 

photo-1453799527828-cf1bd7b2f682.jpegAnomaly detection is an important component of any security solution. Based off of data at login and user activity in the application post login, a complete solution can provide real-time alerts and enable IT to enforce actions when an anomalous event is detected.

Read More