blog-banner.jpg

Total Cloud Security Blog

Bitglass Secure Access Service Edge (SASE) Overview

By Will Houcheime  |  January 6, 2021 at 5:00 AM  | 

With 2020 in the rear view mirror, we’re excited to start the New Year with new content and tons of exciting news. We’re kicking off 2021 with our new video which briefly highlights Bitglass’ Total Cloud Security Platform. Our secure access service edge (SASE) offering provides end-to-end data protection for any interaction – specifically designed for today’s remote workforce. Check out our video below to learn more!

Read More

Glass Class: High-performance Security - The PolyScale Architecture

By Mike Schuricht  |  March 24, 2020 at 5:00 AM  | 

How do cloud security architectural design decisions affect vendors’ ability to provide a performant, scalable, and reliable platform?

Take the example of an offsite meeting.  Thousands of normally geographically dispersed employees converge on a single location for a few days.  Other cloud security solutions built on the appliance model cannot scale to meet the dynamic demand profile. 

Read More

Glass Class: Finding Shadow IT

By Samantha Nguyen  |  January 23, 2020 at 5:00 AM  | 

 

What can help you find what needs protecting in the crowded sea of apps going through your network? Shadow IT Discovery has the answer, with solutions that offer ease of use and visibility into the vulnerabilities present throughout your organization. Identifying apps is the first, but at times most time consuming, step into a comprehensive cloud solution. Shadow IT Discovery makes it easy.

Read More

Appeasing the Oasis of Unknown: Shadow IT Discovery

By Samantha Nguyen  |  October 15, 2019 at 5:00 AM  | 
Abstract blue text background

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive logs can be overwhelming. Shadow IT discovery offers the ability to narrow down the search to apps that should be more closely monitored and controlled.

 

Read More
FOLLOW US

BLOG TOPICS

see all