blog-banner.jpg

Next-Gen CASB Blog

Glass Class: Finding Shadow IT

By Samantha Nguyen  |  January 23, 2020 at 5:00 AM  | 

 

What can help you find what needs protecting in the crowded sea of apps going through your network? Shadow IT Discovery has the answer, with solutions that offer ease of use and visibility into the vulnerabilities present throughout your organization. Identifying apps is the first, but at times most time consuming, step into a comprehensive cloud solution. Shadow IT Discovery makes it easy.

Read More

Appeasing the Oasis of Unknown: Shadow IT Discovery

By Samantha Nguyen  |  October 15, 2019 at 5:00 AM  | 
Abstract blue text background

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive logs can be overwhelming. Shadow IT discovery offers the ability to narrow down the search to apps that should be more closely monitored and controlled.

 

Read More

Glass Class: The ZScaler and Bitglass Integration

By Will Houcheime  |  September 18, 2019 at 5:00 AM  | 

 

With the various tools used in today’s cloud-first world, it could be confusing for organizations to find the correct tools they need to protect sensitive data. In light of this, Bitglass and Zscaler have partnered with each other to provide a solution to create a safe zone for the use of unsanctioned cloud applications. To find out more about how the Bitglass cloud access security broker (CASB) integrates with the Zscaler secure web gateway (SWG), check out our latest Glass Class.

Read More

Glass Class: Protecting Unmanaged Device Access to Cloud Apps

By Will Houcheime  |  August 28, 2019 at 4:57 AM  | 

 

With the rapid adoption of bring your own device (BYOD), companies are in need of a security solution that can secure any device outside of the corporate firewall. Some companies have turned to agent-based tools in order to secure unmanaged device access; however, they consistently find that such tools do not allow for a smooth deployment. There are virtually limitless personal devices that can be used to access data, and installing agents on all of them is incredibly challenging – particularly because of employee privacy concerns. In our latest Glass Class, we explain how companies can adopt BYOD and secure their sensitive data without the use of agents. 

Read More