<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">

Next-Gen CASB Blog

Shadow IT and the End of the Endless Race

By Paul Sullivan  |  March 12, 2018 at 4:16 AM  | 

Hand holding smartphone with colorful app icons concept.jpeg

Using shadow IT discovery is a great way to identify data leakage – but how can organizations be certain that it is effective? First-generation cloud access security brokers (CASBs) rely on manually curating lists of cloud apps in order to enable shadow IT discovery. Each app must be individually evaluated so that its level of risk can be identified. It must also be tied to domains and IP addresses so that it can be detected in network or proxy logs. Unfortunately, there are so many apps in existence that it is impossible to gather all of the necessary information manually. However, the Next-Gen CASB is automating this process to keep up with the ever-expanding number of cloud apps.

Read More

Where have all the CASBs gone?

By Nat Kausik  |  February 27, 2018 at 10:26 AM  | 


The CASBmarket started out with a fistful of companies five years ago.  Now there are just a couple left. What happened?

Read More

The Ins and Outs of Shadow IT

By Paul Sullivan  |  December 18, 2017 at 5:03 AM  | 


Shadow IT refers to the unsanctioned applications used by employees who disregard IT's app approval processes. By definition, this means that IT departments lack complete visibility into what is being used to store and process data. This invites risks like data exfiltration from malicious insiders, upload of sensitive data to unsecured cloud apps by careless employees, and more – all without IT’s knowledge. 

Read More

Securing Office 365 with a Cloud Access Security Broker

By Chantelle Patel  |  June 28, 2016 at 3:00 PM  | 

Office 365 is rapidly becoming the go-to solution for many organizations as they migrate to the cloud. With the implementation of new cloud programs come concerns around data protection and compliance.

Read More