3. WHAT IS DRIVING THE NEED?
3
Enterprise productivity apps are gaining momentum and the proclivity of business
users to acquire such apps is growing too
There are more than 20,000 apps out there and the numbers are growing
4. Forbes says
Hybrid cloud adoption grew 3X in 2017 – 57% from 19%
80% of all IT budgets will be committed to cloud in next
15 months
73% of orgs are planning a move to fully software-
defined DCs within 2 years
49% of businesses are delaying cloud deployment due to
lack of cybersecurity skills
23% lack confidence to move their data to cloud
Loss of reputation, business disruption
7. CASB
• PROVIDES VISIBILITY TO STEALTH IT, THOUGH CLOSELY TRACKS ACTIVITIES IN CLOUD ENVIRONMENT
• EXTENDED COVERAGE FOR COMMUNICATIONS HAPPENING BETWEEN CLOUD APPLICATIONS AND ON PREM ESTATE
• PROVIDES INCIDENT ALERTS AND PREVENTS ANOMALIES(QUARANTINE ETC)
• ACTS AS A SPOE, HENCE FUNNELS TRAFFIC FOR EFFECTIVE MONITORING AND INSPECTION
• ASSURES DLP, COMPLIANCE, SECURITY CONTROL PROVISIONING AND ACTIONABLE THREAT INTELLIGENCE SHARING IN CLOUD ENVIRONMENT
• RESEARCH IS UNDERWAY TO INTEGRATE SUPERVISED/ UNSUPERVISED MACHINE LEARNING TO PROVIDE ADVANCE THREAT DETECTION AND RISK
MITIGATION
7
8. HOW DOES CASB WORK?
8
>> CASB is
connected to cloud
service API
>> Monitors usage
irrespective of how
and where the cloud
services are
accessed
>> Covers tracking
of the usage out of
org network on
unmanaged devices
API Model
>> CASB is
deployed On Prem
or on Cloud
>> Users are
installed with self-
signed certificates
>> Intrusive
deployment as the
user traffic is routed
through CASB
Forward
Proxy
>> Most common
method for
deploying CASB
>> Replaces IAM
service for
authentication
>> Easier way to
implement for cloud
end users
Reverse Proxy
10. WHAT IS IN IT FOR US?
10
Managing cloud apps
Preventing Data Exfiltration
Access Control
Unmanaged apps Managed apps
Policy Management
Threat Intelligence