SlideShare une entreprise Scribd logo
1  sur  23
© Information Security Media Group · www.ismgcorp.com© Information Security Media Group · www.ismgcorp.com
CASBs: 8 Critical
Capabilities
Presented by
Rich Campagna
VP Products, Bitglass
© Information Security Media Group · www.ismgcorp.com
About Information Security Media Group
• Focused on providing information
security content, specifically for
unique vertical industries
• Publish articles, interviews, blogs,
regulation & guidance alerts, and
whitepapers
• Educational webinars offered daily
Global network of
25 SITES
Subscribers from over
175 COUNTRIES
© Information Security Media Group · www.ismgcorp.com
Technical Support
(609) 356-1499 x115
Copyrighted Material
Used for individual study purposes only. If your institution is interested in using
this, or any of Information Security Media Group’s presentations, as part of an
overall information security program, please contact us at (800) 944-0401.
© Information Security Media Group · www.ismgcorp.com
About Bitglass
Bitglass is a Cloud Access Security Broker (CASB) that provides more than 200 enterprises, in every
major vertical, with end-to-end data protection from the cloud to the device.
Bitglass enables enterprises to secure cloud apps like Office 365 and Salesforce, and internal apps like
Exchange and Sharepoint. Corporate data security policies can be enforced across multiple cloud
services. Mobile devices can be protected without the hassles of MDM.
© Information Security Media Group · www.ismgcorp.com
About the Speaker
Rich Campagna
VP Products, Bitglass
Rich runs product management and marketing at Bitglass. Prior
to joining Bitglass, Rich was senior director of product
management at F5 Networks and at Juniper Networks,
responsible for SSL VPN, NAC, and mobile security strategy.
Rich started his career in sales engineering at Sprint.
Rich received an M.B.A. from the UCLA Anderson School of
Management and a B.S. in electrical engineering from
Pennsylvania State University.
STORYBOAR
the traditional
approach to
security is
inadequate
STORYBOAR
security must
evolve to
protect data
outside the
firewall
cloud:
attack on SaaS
vendor risks
sensitive data
access:
uncontrolled
access from
any device
network:
data breach -
exfiltration &
Shadow IT
mobile:
lost device with
sensitive data
7
STORYBOAR
CASB: a
better
approach to
cloud security
identity
discovery
data-centric
security
mobile
STORYBOAR
enterprise
(CASB)
end-user devices
visibility & analytics
data protection
identity & access control
application
storage
servers
network
1. how does the solution differ from security built into
cloud apps?
app vendor
STORYBOAR
2. does the solution protect cloud data end-to-end?
■ Cloud data doesn’t exist only “in the cloud”
■ A complete solution must provide visibility
and control over data in the cloud
■ Solution must also protect data on end-
user devices
■ Leverage contextual access controls
STORYBOAR
3. can the solution control access from both managed
& unmanaged devices?
reverse proxy
■ unmanaged devices - any device, anywhere
■ no software to install/configure
forward proxy
■ managed devices - inline control for installed apps
■ agent and certificate based approaches
activesync proxy
■ secure email, calendar, etc on any mobile device
■ no software to install/configure
STORYBOAR
4. does the solution provide real-time visibility and
control?
■ Apply granular DLP to data-at-rest and upon access
■ Context-awareness should distinguish between users,
managed and unmanaged devices, and more
■ Flexible policy actions (DRM, quarantine, remove
share, etc) required to mitigate overall risk
STORYBOAR
5. can the solution encrypt data at upload?
■ Encryption must preserve app functionality
■ Encryption must be at full strength, using
industry standard encryption (AES-256, etc)
■ Customer managed keys required
STORYBOAR
6. does the solution protect against unauthorized
access?
■ Cloud app identity management should
maintain the best practices of on-prem
identity
■ Cross-app visibility into suspicious access
activity with actions like step-up multifactor
authentication
STORYBOAR
7. can the solution help me discover risky traffic on my
network, such as shadow IT and malware?
■ Analyze outbound data flows to
learn what unsanctioned SaaS
apps are in use
■ Understand risk profiles of
different apps
STORYBOAR
8. will the solution introduce scale or performance
issues?
■ Hosted on high-performance, global cloud
infrastructure to introduce minimal latency
■ Security should not get in the way of user
experience/productivity
STORYBOAR
1. How does the solution differ from security built into cloud apps?
2. Does the solution protect cloud data end-to-end?
3. Can the solution control access from both managed & unmanaged devices?
4. Does the solution provide real-time visibility and control?
5. Can the solution encrypt data at upload?
6. Does the solution protect against unauthorized access?
7. Can the solution help me discover risky traffic on my network, such as shadow IT?
recap: 8 questions to ask when evaluating a CASB
vendor
STORYBOAR
about
bitglass
total
data
protection est. jan
2013
200+
customers
tier 1
VCs
STORYBOAR
bitglass
solutions
cloud mobile breach
19
STORYBOAR
secure
office 365
+ byod
client:
■ 35,000 employees globally
challenge:
■ Inadequate native O365 security
■ Controlled access from any device
■ Limit external sharing
■ Interoperable with existing
infrastructure, e.g. Bluecoat, ADFS
solution:
■ Real-time data visibility and control
■ DLP policy enforcement at upload or
download
■ Quarantine externally-shared sensitive
files in cloud
■ Controlled unmanaged device access
■ Shadow IT & Breach discovery
fortune 50
healthcare
firm
STORYBOAR
■ 15,000 employees in 190+ locations
globally
challenge:
■ Mitigate risks of Google Apps adoption
■ Prevent sensitive data from being
stored in the cloud
■ Limit data access based on device risk
level
■ Govern external sharing
solution:
■ Inline data protection for unmanaged
devices/BYOD
■ Bidirectional DLP
■ Real-time sharing control
secure
google
apps +
byod
business
data giant
© Information Security Media Group · www.ismgcorp.com© Information Security Media Group · www.ismgcorp.com
Questions
Please use the following form for any questions or comments:
http://www.bankinfosecurity.com/webinar-feedback.php
Or contact us at: (800) 944-0401
© Information Security Media Group · www.ismgcorp.com© Information Security Media Group · www.ismgcorp.com
Thank You for Participating!
Please use the following form for any questions or comments:
http://www.bankinfosecurity.com/webinar-feedback.php
Or contact us at: (800) 944-0401

Contenu connexe

Tendances

US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
Bitdefender Enterprise
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
Kaspersky
 

Tendances (20)

Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
US Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to BitdefenderUS Roadshow - Introduction to Bitdefender
US Roadshow - Introduction to Bitdefender
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
briefing
briefingbriefing
briefing
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
IRM Briefing
IRM BriefingIRM Briefing
IRM Briefing
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
 
(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 

Similaire à CASBs: 8 Critical Capabilities in partnership with ISMG Media Group

Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
SolarWinds
 

Similaire à CASBs: 8 Critical Capabilities in partnership with ISMG Media Group (20)

8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker
 
Developing a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial ServicesDeveloping a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial Services
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
CipherCloud for Any App
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021 WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
WatchGuard Integrates with CommScope RUCKUS: Full Solutions for 2021
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
Panda Security Corporate Presentation
Panda Security Corporate PresentationPanda Security Corporate Presentation
Panda Security Corporate Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 

Plus de Bitglass

Plus de Bitglass (20)

Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 
Bridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond MediaBridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond Media
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

CASBs: 8 Critical Capabilities in partnership with ISMG Media Group

  • 1. © Information Security Media Group · www.ismgcorp.com© Information Security Media Group · www.ismgcorp.com CASBs: 8 Critical Capabilities Presented by Rich Campagna VP Products, Bitglass
  • 2. © Information Security Media Group · www.ismgcorp.com About Information Security Media Group • Focused on providing information security content, specifically for unique vertical industries • Publish articles, interviews, blogs, regulation & guidance alerts, and whitepapers • Educational webinars offered daily Global network of 25 SITES Subscribers from over 175 COUNTRIES
  • 3. © Information Security Media Group · www.ismgcorp.com Technical Support (609) 356-1499 x115 Copyrighted Material Used for individual study purposes only. If your institution is interested in using this, or any of Information Security Media Group’s presentations, as part of an overall information security program, please contact us at (800) 944-0401.
  • 4. © Information Security Media Group · www.ismgcorp.com About Bitglass Bitglass is a Cloud Access Security Broker (CASB) that provides more than 200 enterprises, in every major vertical, with end-to-end data protection from the cloud to the device. Bitglass enables enterprises to secure cloud apps like Office 365 and Salesforce, and internal apps like Exchange and Sharepoint. Corporate data security policies can be enforced across multiple cloud services. Mobile devices can be protected without the hassles of MDM.
  • 5. © Information Security Media Group · www.ismgcorp.com About the Speaker Rich Campagna VP Products, Bitglass Rich runs product management and marketing at Bitglass. Prior to joining Bitglass, Rich was senior director of product management at F5 Networks and at Juniper Networks, responsible for SSL VPN, NAC, and mobile security strategy. Rich started his career in sales engineering at Sprint. Rich received an M.B.A. from the UCLA Anderson School of Management and a B.S. in electrical engineering from Pennsylvania State University.
  • 7. STORYBOAR security must evolve to protect data outside the firewall cloud: attack on SaaS vendor risks sensitive data access: uncontrolled access from any device network: data breach - exfiltration & Shadow IT mobile: lost device with sensitive data 7
  • 8. STORYBOAR CASB: a better approach to cloud security identity discovery data-centric security mobile
  • 9. STORYBOAR enterprise (CASB) end-user devices visibility & analytics data protection identity & access control application storage servers network 1. how does the solution differ from security built into cloud apps? app vendor
  • 10. STORYBOAR 2. does the solution protect cloud data end-to-end? ■ Cloud data doesn’t exist only “in the cloud” ■ A complete solution must provide visibility and control over data in the cloud ■ Solution must also protect data on end- user devices ■ Leverage contextual access controls
  • 11. STORYBOAR 3. can the solution control access from both managed & unmanaged devices? reverse proxy ■ unmanaged devices - any device, anywhere ■ no software to install/configure forward proxy ■ managed devices - inline control for installed apps ■ agent and certificate based approaches activesync proxy ■ secure email, calendar, etc on any mobile device ■ no software to install/configure
  • 12. STORYBOAR 4. does the solution provide real-time visibility and control? ■ Apply granular DLP to data-at-rest and upon access ■ Context-awareness should distinguish between users, managed and unmanaged devices, and more ■ Flexible policy actions (DRM, quarantine, remove share, etc) required to mitigate overall risk
  • 13. STORYBOAR 5. can the solution encrypt data at upload? ■ Encryption must preserve app functionality ■ Encryption must be at full strength, using industry standard encryption (AES-256, etc) ■ Customer managed keys required
  • 14. STORYBOAR 6. does the solution protect against unauthorized access? ■ Cloud app identity management should maintain the best practices of on-prem identity ■ Cross-app visibility into suspicious access activity with actions like step-up multifactor authentication
  • 15. STORYBOAR 7. can the solution help me discover risky traffic on my network, such as shadow IT and malware? ■ Analyze outbound data flows to learn what unsanctioned SaaS apps are in use ■ Understand risk profiles of different apps
  • 16. STORYBOAR 8. will the solution introduce scale or performance issues? ■ Hosted on high-performance, global cloud infrastructure to introduce minimal latency ■ Security should not get in the way of user experience/productivity
  • 17. STORYBOAR 1. How does the solution differ from security built into cloud apps? 2. Does the solution protect cloud data end-to-end? 3. Can the solution control access from both managed & unmanaged devices? 4. Does the solution provide real-time visibility and control? 5. Can the solution encrypt data at upload? 6. Does the solution protect against unauthorized access? 7. Can the solution help me discover risky traffic on my network, such as shadow IT? recap: 8 questions to ask when evaluating a CASB vendor
  • 20. STORYBOAR secure office 365 + byod client: ■ 35,000 employees globally challenge: ■ Inadequate native O365 security ■ Controlled access from any device ■ Limit external sharing ■ Interoperable with existing infrastructure, e.g. Bluecoat, ADFS solution: ■ Real-time data visibility and control ■ DLP policy enforcement at upload or download ■ Quarantine externally-shared sensitive files in cloud ■ Controlled unmanaged device access ■ Shadow IT & Breach discovery fortune 50 healthcare firm
  • 21. STORYBOAR ■ 15,000 employees in 190+ locations globally challenge: ■ Mitigate risks of Google Apps adoption ■ Prevent sensitive data from being stored in the cloud ■ Limit data access based on device risk level ■ Govern external sharing solution: ■ Inline data protection for unmanaged devices/BYOD ■ Bidirectional DLP ■ Real-time sharing control secure google apps + byod business data giant
  • 22. © Information Security Media Group · www.ismgcorp.com© Information Security Media Group · www.ismgcorp.com Questions Please use the following form for any questions or comments: http://www.bankinfosecurity.com/webinar-feedback.php Or contact us at: (800) 944-0401
  • 23. © Information Security Media Group · www.ismgcorp.com© Information Security Media Group · www.ismgcorp.com Thank You for Participating! Please use the following form for any questions or comments: http://www.bankinfosecurity.com/webinar-feedback.php Or contact us at: (800) 944-0401