blog-banner.jpg

Security "Bits"

The Bitglass SASE Triangle: SWG for Securing Web Traffic

By Will Houcheime  |  September 10, 2020 at 5:00 AM  | 
2-2

In today’s modern workforce, the enterprise attack surface is larger than ever before; with cloud apps, personal devices, on-premises resources, web destinations, and more. As a result, organizations are in need of a context-aware solution that can enforce policies wherever data goes. Fortunately, Bitglass’ secure access service edge (SASE) offering provides organizations with just that. Now that we’ve covered security for managed SaaS and IaaS in the first part of this series, we’ll move on to the next vital piece of the SASE triangle: our SmartEdge Secure Web Gateway (SWG), which secures the web and shadow IT. 

Read More

Glass Class: High-performance Security - The PolyScale Architecture

By Mike Schuricht  |  March 24, 2020 at 5:00 AM  | 

How do cloud security architectural design decisions affect vendors’ ability to provide a performant, scalable, and reliable platform?

Take the example of an offsite meeting.  Thousands of normally geographically dispersed employees converge on a single location for a few days.  Other cloud security solutions built on the appliance model cannot scale to meet the dynamic demand profile. 

Read More

Glass Class: Finding Shadow IT

By Samantha Nguyen  |  January 23, 2020 at 5:00 AM  | 

 

What can help you find what needs protecting in the crowded sea of apps going through your network? Shadow IT Discovery has the answer, with solutions that offer ease of use and visibility into the vulnerabilities present throughout your organization. Identifying apps is the first, but at times most time consuming, step into a comprehensive cloud solution. Shadow IT Discovery makes it easy.

Read More

Appeasing the Oasis of Unknown: Shadow IT Discovery

By Samantha Nguyen  |  October 15, 2019 at 5:00 AM  | 
Abstract blue text background

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive logs can be overwhelming. Shadow IT discovery offers the ability to narrow down the search to apps that should be more closely monitored and controlled.

 

Read More
FOLLOW US

BLOG TOPICS

see all