<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast"> jQuery UI Accordion - Collapse content
background3.jpg

CASB FAQ: Frequently Asked Questions

  1. What is a CASB?  A Cloud Access Security Broker (CASB) is a policy enforcement point that secures data & apps in the cloud and on any device, anywhere.
  2. What is the difference between security and management? Security is preventing  risky events from happening, management is cleaning up after high-risk events.
  3. What is Shadow IT?  Cloud applications used by business users without IT oversight, also known as unmanaged apps.
  4. What are managed apps?  Cloud Applications that are managed by IT, e.g.Office 365.
  5. What are the types of CASB?  Three types of Cloud Access Security Broker (a) API-only CASB offer basic management (b) multi-mode first-gen CASB offer management & security (c) Next-Gen CASB deliver management, security & Zero-Day protection.
  6. What is a forward proxy?  A proxy where traffic must be forwarded by the end-point Such proxies require agents and configuration on client devices.
  7. What is a reverse proxy?  A proxy where traffic is automatically routed, requiring no agent or configuration on the end-point.
  8. What is AJAX-VM?  Acrononym for "Adaptive Javascript and XML- Virtual Machine."  AJAX-VM virtualizes cloud apps on the fly so they can be proxied without agents.   Reverse-proxy CASB are brittle without AJAX-VM and break frequently with app changes. 
  9. What are the types of CASB architecture? There are three types of CASB architecture: API-only, forward proxy, and reverse proxy.  Some CASB are API-only, others API and forward proxy. Next-Gen CASBs offer all three with AJAX-VM.
  10. What is CASB encryption?  Encryption/decryption of data prior to upload/download to a cloud application.  
  11. What is searchable encryption?  An encryption system that combines full encryption with a clear-text index to enable search and sort without compromising encryption strength.
  12. What is tokenization? Obfuscation by encoding each input string as a unique output string.
  13. What is agentless MDM?  Mobile security for BYOD that does not require agents. Easy to deploy and has no access to personal data or apps, thereby preserving user privacy.