Click me
Transcribed

Improving Cloud Security

IT'S TIME TO EMBRACE CLOUD, SECURELY CLOUD ACCESS SECURITY BROKERS CASB'S Don't let security and compliance concerns keep you from adopting the cloud. CASBS ARE SECURITY TOOLS that help your company safely enable cloud applications and mobile devices. and CLOUD APPS by “proxying" traffic. These tools mediate between USERS ULTIMATELY PROVIDING VISIBILITY audit logs, security alerts, compliance reports, etc. PROTECTION FOR SENSITIVE DATA DATA SECURITY Heavily regulated industries access control, data leakage prevention, encryption, etc. can securely store their sensitive data with CASBS AREN'T CLOUD APPS SAAS APPLICATION PROVIDERS WANT ALREADY SECURE? YOUR TRUST, SO THEY WORK WITH THE BEST IT PROFESSIONALS TO ENSURE THEIR PRODUCTS ARE AS SECURE AS POSSIBLE. THEIR PRIMARY FOCUS is preventing breaches THEIR NETWORK INTO infrastructure WHAT ABOUT THE SECURITY RISKS THAT PUT YOUR COMPANY IN DANGER? When your SENSITIVE CORPORATE DATA isn't properly controlled, THE RESPONSIBILITY OF PROTECTING YOUR THIS DATA COMPANY'S DATA AND USER ACCOUNTS can be YOU LIES LEAKED or STOLEN BALANCING YOUR COMPANY'S IT NEEDS AND EMPLOYEE DEMANDS INCREASED SECURITY doesn't have to mean A POOR USER EXPERIENCE Choose security solutions which WON'T HAMPER THE EMPLOYEE'S PRODUCTIVITY CSABS may help you stop employees from "GOING ROGUE" AND WORKING AROUND SECURITY MEASURES ON THEIR OWN. PRIVACY TRANSPARENCY MOBILITY Your employees have a right to their personal privacy. Employees want their corporate apps to have the same level of usability as their personal apps. Employees want to be able to use their choice of devices while still connecting to their work data and apps. IN THE CLOUD THE COMPLETE CASB SOLUTION PROTECTS CORPORATE DATA THROUGHOUT CASBS ON THE DEVICE AT ACCESS ITS ENTIRE LIFE CYCLE LIFE CYCLE ON THE NETWORK HOW EXACTLY ARE CASBS USED AT VARIOUS POINTS OF THE LIFE CYCLE? IN THE CLOUD AT ACCESS ON THE DEVICE ON THE NETWORK CASBS IDENTIFY AN ORGANIZATION'S CLOUD APPS CASBS FOR CASBS CASBS CLOUD ENCRYPTION CONTROL ALL TRAFFIC PROTECT DATA ON THE DEVICE THAT ARE IN USE Companies control their own encryption key. Contextual access control decides who can access each app. Selectively wipe corporate data when employees leave or devices are stolen. Categorize apps to analyze by function. No one can gain access to corporate data without their knowledge. Data protection identifies and secures sensitive data. Encrypt sensitive data upon download to minimize leakage risk. Score applications on risk attributes for fast decisions to block or allow. Some app functionality may be affected. Single sign-on for ease of access and control. Enforce basic device policies like encryption and passcodes. Evaluate usage by user, group, and device, so you know who is doing what. | Encrypted data can not be searched. Detailed visibility for security and compliance insights and reporting. Track and fingerprint downloads | to maintain visibility. Track and fingerprint downloads to maintain visibility. CHOOSE THE RIGHT PRIMARY PROXY FOR YOUR BUSINESS TO MEDIATE BETWEEN YOUR CLOUD APPS AND USERS FORWARD REVERSE PROXY PROXY THE SUPERIOR CHOICE PROS CONS PROS CONS CAN BE USED FOR ALL APPLICATION TYPES • Client-server apps with hard coded hostnames. NOT APPLICABLE TO CLIENT-SERVER DIFFICULT TO DEPLOY ACCESSIBLE FROM ANY DEVICE/LOCATION • Suitable for mobile workforce. • in mobile workforce environment. APPLICATION WITH REDUCED END-USER PRIVACY HARD-CODED END-USER PRIVACY • Only corporate traffic is sent via proxy [For example:] Corporate Gmail is proxied, but not personal Gmail. HOSTNAMES • Requires installation/user acceptance of self-signed digital certificates at each point of use. SIMPLE TO DEPLOY • No configuration or firewalls on mobile devices. MANY CASBS LEVERAGE A MIX OF FORWARD AND REVERSE PROXY ARCHTECTURES FOR DIFFERENT USE CASES BE PREPARED BEFORE YOUR CLOUD ACCESS SECURITY BROKERS ARE QUICKLY BECOMING A MUST-HAVE COMPANY JOINS THE CLOUD For more information on securely implementing total data protection for your company, visit SECURITY SOLUTION Obitglass VISIT BITGLASS.COM Sources The Definitive Guide to Cloud Access Security Brokers Whitepaper DEVELOPED BY N NOWSOURCING

Improving Cloud Security

shared by NowSourcing on Oct 06
143 views
2 shares
0 comments
Security is everything. Learn how to beef it up when you're dealing with the cloud.

Publisher

Bitglass

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size