<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
shutterstock_553333903-4.jpg

cloud access security broker

Cloud access security brokers (CASBs) are data-centric security platforms that protect data end-to-end, from SaaS, IaaS, and custom cloud applications to any endpoint. By proxying traffic between cloud apps and end-user devices, CASBs offer control and visibility over all your corporate data.

CASBs leverage proxies and APIs to protect data in the cloud and at access. Proxies enable real-time, inline security while API integration provides control over backend functions like external sharing. Most enterprises require a hybrid CASB that provides both proxy-based and API-based protections for comprehensive cloud data protection.

  • Identity
  • Data Protection
  • Threat Protection
  • Visibility
Identity

A complete CASB features integrated identity management to enable secure authentication across all cloud apps. Organizations should securely authenticate users through single sign on (SSO) and two-factor authentication, as well as step up to real-time multi-factor auth to address suspicious logins and prevent unauthorized access.

Additionally, contextual access control capabilities ensures that appropriate access is provisioned based on the context by which the user is accessing your cloud apps. Define access policies based on access method, device, location, and more.

Data Protection

Bitglass uses a high-performance cloud DLP featuring a comprehensive catalog of pre-built identifiers enabling data protection at access. By proxying traffic, you can apply remediation actions in real time based on the content of a file or the context of a user's access. Actions include encryption, DRM, redaction, watermarking, and more.

For heavily regulated organizations, encryption of data-at-rest in the cloud provides an additional layer of security and a dual system of control for IT administrators. Full-strength encryption that doesn't impede on application functionality where you control the keys can be invaluable in protecting fields or files in all your sanctioned cloud apps.

Cloud and mobile are inseparable components of a complete security solution. CASBs are frequently used as an agentless alternative to MDM and are capable of enforcing a wide array of device security policies without installing software or agents.

Threat Protection

Through the combination of API and proxy-based control, Bitglass provides full visibility into every transaction conducted in the application. User behavior analytics, focused on suspicious activity detection, are built on that visibility and reported via alerts, dashboards, and SIEM integration.

Moreover, Bitglass provides cross-app visibility, empowering you to discover suspicious and abnormal behavior. If a user accesses Slack from LA, and then an hour later tries to access Office 365 from NYC, Bitglass can flag and prevent that login.

Additionally, known and unknown threats can easily spread across cloud apps and endpoints if you don't have the proper security controls in place. Advanced threat protection with predictive AI-based detection can readily detect and stop the spread of known and unknown malware and ransomware across apps and on any device.

Visibility

Visibility is a large gap in many sanctioned applications, with few providing even basic audit or activity logs. Bitglass helps fill these gaps by providing audit-level logging and alerts and reports that up-level those logs into actionable security intelligence. One portal for monitoring all enterprise cloud apps.

With Shadow IT Discovery, Bitglass can also identify high risk traffic leaving the corporate network. Bitglass provides an overall assessment of risky traffic - including not only Shadow IT, but malware, anonymizers, and several other categories of traffic indicative of data exfiltration. Alert administrators to high risk data outflows, detect and control any unsanctioned application, and more.