casb
Turns out everyone has budget for a CASB
This post was originally published here by Salim Hafid. Cloud security represents a fast growing part of most organizations’ budgets, but many CISOs are left deciding between costly point solutions. Fortunately, cloud access security brokers have emerged as a means of bundling critical capabilities across data protection, threat protection, identity management, and visibilityat a relatively low cost. […]
Bitglass the Sole Visionary in Gartner Magic Quadrant for CASB
This post was originally published here by Rich Campagna. If you haven’t yet seen it, Gartner recently released the very first Magic Quadrant for Cloud Access Security Brokers,1 and Bitglass was honored to be named the sole Visionary. According to Gartner, “Visionaries invest in leading-edge/”bleeding”-edge features that will be significant in next-generation products, and that give buyers […]
Private App Cloud Migration Requires CASB
This post was originally published here by Rich Campagna. Cloud Access Security Brokers (CASB) have gotten a lot of adoption over the past couple of years, with Gartner recently publishing their first Magic Quadrant for CASBs. Since Cloud is in the name, most organizations think of CASB when trying to achieve their security and compliance goals for public SaaS […]
Insider Threats, Machine Learning, and the Next-Gen CASB
This post was originally published here by Kevin Gee. One of the biggest dangers to application security is that of the insider threat. This ranges from users who unknowingly expose credentials and sensitive data to external parties, to disgruntled employees who act against the company’s interests. These threats are difficult to prevent with common security configurations and are big reasons why user and entity behavior analytics (UEBA) is such a common buzzword within the security industry. It is absolutely critical for any […]
Can a CASB Thwart the Uber Hack?
This post was originally published here by Rich Campagna. Another day, another massive data breach, this one involving Uber and the theft of data on more than 57 million drivers and customers. Like the recent high profile AWS S3 misconfigurations leading to unwanted exposure of sensitive data, the Uber hack could have been prevented with basic Cloud Access […]
Next-Gen CASB: Zero-Day Protection
This post was originally published here by Salim Hafid. Many organizations struggle with unknown apps. Whether it’s a new EFSS service, a messaging platform, or any other web-based service, new apps are driving corporate data outside the firewall and oftentimes beyond managed “sanctioned” cloud applications like Office 365. To manually identify new upload paths is an impossible task […]
CASB For Hire
This post was originally published here by Jacob Serpa. Recently, a trivia-loving employee at Bitglass uncovered an interesting job opening on a leading financial institution’s careers page. The position was titled “Cloud Access Security Broker Principal Architect” and was focused on ensuring the full implementation of a cloud access security broker (CASB). This obviously highlights the growing importance […]
Agentless CASB, FTW
This post was originally published here by Rich Campagna . Hardly a day goes by without a widely reported breach or hacking event in a major enterprise. Deloitte has the misfortune of being today’s top information security news story. In this case, it’s been reported that Deloitte email servers, hosted on Microsoft Azure, were compromised after […]
CASB: Come for O365, Stay for Any App
This post was originally published here by Rich Campagna. The Cloud Access Security Broker (CASB) market, barely 4 years old, has rapidly evolved from a visibility tool for unsanctioned cloud apps, to the de facto data protection standard as enterprises adopt cloud and mobile. Early entrants in the space drew much press and funding, but after the […]
The Great CASB: Part Four
This post was originally published here by Jacob Serpa. Why You Don’t Need MDM In Part One, we discussed why you need a CASB in light of current business trends (cloud, BYOD, et cetera). In Part Two, we described the cybersecurity capabilities that companies need as they take advantage of the cloud. In Part Three, we detailed the mobile security […]