Wednesday, March 3, 2021
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home Blog

Cloud Security – A look into CASB

Hamzat Lateef by Hamzat Lateef
October 21, 2019
in Blog
0
Cloud assess security broker
Share on FacebookShare on Twitter

Cloud Assess Security Broker

Cloud has come to stay but the security of cloud is what the end-users and security professionals are still worried about. Services ranging from Software, Platform, Infrastructure and many more are now available to be leverage on by businesses but users accessing unapproved cloud services and mishandling data even in approved ones, is one of the greatest challenges’ security teams face.

When we talk about the security of cloud platform, we have to look at it from two perspectives; one is from the cloud service provider, two is from the user of the platform. In recent years, cloud service provider has tightened their belt to ensure safety and security of the platform and the services they offer, while the larger work now rests on the users. In the bid for high availability and scalability that comes with the cloud, migrations are ongoing daily to the cloud by small and big businesses for them to stay competitive and to reduce the overhead cost that comes with fleets of IT infrastructure.

Many organizations today are also concern about gaining visibility into how their employees are using their cloud resources, putting in mind data security, compliance, and threat protection. This visibility could be in an official or unsanctioned usage of the cloud services.

According to Gartner research, it is expected in a few years that more of the failure of the cloud security will largely be from failure from users and not the cloud service providers. To address the security failure that could come from the end-users and to give organization controls over their cloud services security, CASB (Cloud Assess Security Broker) is the way to go for organizations.

What is CASB? (sometimes pronounced cas-bee)

CASB stands for Cloud Assess Security Broker which helps IT departments monitor cloud service usage within their organization and implement centralized controls to ensure that cloud services are used securely. There are four pillars a CASB should be addressing, which are visibility, compliance, data security and threat protection according to netskope.

How does a CASB work?

CASBs may run in a corporate data center or in a hybrid mode that involves the data center and the cloud, but the majority of organizations choose a CASB that operates exclusively from the cloud – unless regulatory or data sovereignty considerations require an on-premises solution.

CASBs can be deployed as a reverse proxy, a forward proxy or in an API mode. Because of the advantages and disadvantages that come with each of the modes,

Top CASBs Vendor

There are various CASB vendors  in the market today, with link to detail information on them.

Forcepoint CASB

Forcepoint’s proxy and API-based capabilities allow the company to support any cloud application in the market and provide blocking capabilities. The CASB provides deep visibility into thousands of user activities, enabling security teams to understand user behavior and implement data loss prevention (DLP) capabilities. These can be designed to stop exfiltration of data for both managed and unmanaged BYOD devices.

McAfee MVISION Cloud

McAfee entered the CASB space with the acquisition of CASB startup Skyhigh Networks in 2018. The product was renamed McAfee Skyhigh Security Cloud, and is now known as McAfee MVISION Cloud. The agentless CASB product offers threat protection and data loss prevention for large and very large enterprises, along with specialized offerings such as a dedicated GDPR tool for companies regulated by the EU data protection law.

Cisco Cloudlock

Cisco Cloudlock is a CASB developed as a set of microservices that can be exposed via APIs and can support home-grown applications in addition to top-name cloud apps. The company also offers tight integration with its other security products.

Netskope

Netskope covers thousands of cloud services either through published cloud service APIs or through inline decoding of unpublished APIs. It offers DLP and combines threat intelligence, static and dynamic analysis and machine learning-based anomaly detection to spot threats in real-time.

Microsoft Cloud App Security

Microsoft Cloud App Security is a CASB for everyone from small companies through enterprises. It offers deep integration with Microsoft security products and Office 365, and supports other top cloud apps.

Symantec

Symantec added CASB capabilities to its portfolio in 2016 with the acquisition of Blue Coat Systems’ Perspecsys and Elastica. These two CASB products were merged to create Symantec’s current CASB offering, CloudSOC, which is aimed at enterprise customers with strong cloud discovery, usage monitoring and DLP needs.

Bitglass Cloud Security

Bitglass Cloud Security is the only agentless CASB solution with support for any app and device, and the only CASB with integrated identity and access management (IAM) and agentless mobile data protection. It supports major enterprise cloud applications, plus SaaS, IaaS and custom apps.

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Tags: CASPcloud securityCyber Educationcybersecurity
Hamzat Lateef

Hamzat Lateef

Next Post
NITDA issues license to DPCO

NITDA Issues Licenses to 11 Data Protection Compliance Organizations.

Subscribe

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

  • Trending
  • Comments
  • Latest
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

July 1, 2019
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

6
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
5G Dangers: What are the Cybersecurity implications?

5G Dangers: What are the Cybersecurity implications?

March 1, 2021
Key Differences Between Firewall And Antivirus

Key Differences Between Firewall And Antivirus

February 27, 2021
Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021

Recommended

5G Dangers: What are the Cybersecurity implications?

5G Dangers: What are the Cybersecurity implications?

March 1, 2021
Key Differences Between Firewall And Antivirus

Key Differences Between Firewall And Antivirus

February 27, 2021
Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.