Security "Bits"

Keeping Your Boat Afloat with a Cloud Access Security Broker

By Prasidh Srikanth  |  November 5, 2018 at 4:54 AM  | 

snow in Reine Village, Lofoten Islands, Norway

If you were on a sinking ship that was full of holes of various sizes, which ones would you patch first? Probably the big ones. Now, consider this: As an enterprise, you’ve been successfully sailing and securing your corporate data on premises for some time. However, now you’re migrating to the cloud, looking for increased productivity, collaboration, and cost savings. In this new ocean, organizations must decide how to prioritize security concerns so that they can prevent data leakage.

Read More

Office 365 and the Long Tail of SaaS Apps at Gartner Symposium

By Sophia Zheng  |  October 25, 2018 at 4:59 AM  | 


Bitglass just attended the Gartner Symposium & ITxpo in Orlando, Florida, where we had a fantastic time. With more and more companies moving to the cloud, people were eager to learn about cloud access security brokers (CASBs) like Bitglass and how we can secure their use of any cloud app. As usual, everyone wanted to get a pair of our limited edition CASB socks, too!

Read More

The Next-Gen CASB: Securing Office 365 and Outlasting the Competition

By Jason Lowe  |  October 17, 2018 at 4:54 AM  | 

Businessman hand working with a Cloud Computing diagram on the new computer interface as concept-1

Just last week, Bitglass attended the ISC2 Security Conference held in New Orleans, Louisiana. The city known as “NOLA” and “The Big Easy” was definitely party central USA, with awesome restaurants, great music, and lovely old homes with picturesque courtyards. New Orleans was perfect for the large conference that was held at the Marriott Hotel on Canal Street. With over 2,000 individuals in attendance, it was an incredibly successful event for Bitglass.

Read More

MSFT Azure AD Conditional Access vs CASB

By Tim Davis  |  October 10, 2018 at 4:28 AM  | 

maxresdefaultFor many organizations, the move to the cloud means many more ways for employees to access sensitive data. The days of the corporate-issued laptop on the network (or VPN) being the only way to access corporate data are well behind us. While this increased flexibility can be a boon for end user productivity and mobility, it can also mean greatly increased risk of security events if not enabled in a secure fashion.

Read More


see all