blog-banner.jpg

Total Cloud Security Blog

Glass Class: High-performance Security - The PolyScale Architecture

By Mike Schuricht  |  March 24, 2020 at 5:00 AM  | 

How do cloud security architectural design decisions affect vendors’ ability to provide a performant, scalable, and reliable platform?

Take the example of an offsite meeting.  Thousands of normally geographically dispersed employees converge on a single location for a few days.  Other cloud security solutions built on the appliance model cannot scale to meet the dynamic demand profile. 

Read More

Bitglass for SASE

By Juan Lugo  |  February 26, 2020 at 5:00 AM  | 

In today’s modern workforce, telecommuting, accessing corporate data via personal mobile devices, and cloud-first ecosystems have become the norm. As a result, organizations must rethink their security strategies. Context-based solutions that can enforce policies based on users identity, location, and device, are crucial if organizations intend on enabling access to sensitive data to their employees. SASE, which stands for secure access service edge, enables enterprises to deploy a comprehensive security platform equipped with granular security measures that can protect IT infrastructure.

Read More

Glass Class: Finding Shadow IT

By Samantha Nguyen  |  January 23, 2020 at 5:00 AM  | 

 

What can help you find what needs protecting in the crowded sea of apps going through your network? Shadow IT Discovery has the answer, with solutions that offer ease of use and visibility into the vulnerabilities present throughout your organization. Identifying apps is the first, but at times most time consuming, step into a comprehensive cloud solution. Shadow IT Discovery makes it easy.

Read More

The Rise of Insider Threats in Verizon’s DBIR

By Jacob Serpa  |  January 9, 2020 at 5:00 AM  | 
Closeup of young male theift in sweatshirt with hood transfering money from bills of stolen creding cards-2

Each year, Verizon releases its Data Breach Investigation Report (DBIR). These reports evaluate the state of security each year, providing detailed statistics around leading vulnerabilities, which industries face the most breaches, and much more. In 2019’s report, there were interesting insights about insider threats.

Read More
FOLLOW US

BLOG TOPICS