Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • CASB: Come for O365, Stay for Any App
    The Cloud Access Security Broker (CASB) market, barely 4 years old, has rapidly evolved from a visibility tool for unsanctioned cloud apps, to the de facto data protection standard as enterprises adopt cloud and mobile. Early entrants in the space drew much press and funding, but after the early shock factor of having 100's of Shadow IT apps wore off, most were left scratching their heads what to ...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Data Games: Security Insights from the Experts
    For as long as there have been computers, there have been tech-savvy users fighting one another for supremacy and data. These users can be more or less categorized into two groups - White Hat hackers and Black Hat hackers. White Hat hackers often work in corporate IT and are individuals who use their skills for ethical purposes like protecting data and whistleblowing. Black Hat hackers use their t...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • CASBs: Top of the Class in Higher Ed
    It should come as no surprise that Higher Education, like every other industry, is increasingly turning to Cloud Access Security Brokers (CASBs) like Bitglass to protect sensitive data in the move to the cloud. After all, these organizations are adopting cloud applications more aggressively than most industries, enticed by very attractive licensing from the big cloud productivity platform vendors ...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Bitglass: Ahead of the Curve
    Interest in cloud security continues to increase as enterprises move to adopt cloud applications. Agile, cloud-first organizations are leading the charge to these more flexible applications, but now, large, security conscious, regulated companies are also going cloud. Security is a key pillar for all that adopt these apps.
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Reaching HIPAA Compliance With Bitglass
    The Health Insurance Portability and Accountability Act, or HIPAA, is a U.S. law critical for healthcare organizations. The law aims to safeguard protected health information, or PHI, which is any data that uniquely identifies an individual. PHI can take the form of social security numbers, medical record numbers, license plate numbers, and more. It must be protected by virtually any entity that h...
Bitglass, Inc.
Bitglass, Inc.
Landing Page
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Great CASB: Part Four
    Why You Don’t Need MDM In Part One, we discussed why you need a CASB in light of current business trends (cloud, BYOD, et cetera). In Part Two, we described the cybersecurity capabilities that companies need as they take advantage of the cloud. In Part Three, we detailed the mobile security tools companies need in order to protect their data in a modern, BYOD workplace.
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • EU Courts: Companies Don't Have Unilateral Right to Monitor Employees
    In a major victory for privacy advocates, Europe's Court of Human Rights has ruled on organizations' abilities to monitor employee communications with limited consent. While precedent set in 2016 gave employers blanket ability to monitor traffic "to verify that the employees are completing their professional tasks during working hours", the new decision means employers across Europe will have to s...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Reflections: Gartner Catalyst
    Last week, Bitglass participated in Gartner Catalyst, a conference designed to educate organizations’ technical staffs. Whether it was from conversations at Bitglass’ booth, or from Gartner and vendor speaking sessions, a number of trends consistently bubbled to the surface.
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Datawatch: Beware of Careless Insiders
    Every day, employees around the world use the cloud to perform their jobs. With bring your own device (BYOD), workers are given dynamic data access to complete their work from unmanaged devices, remote locations, and unsafe WiFi. Due to the host of modern cloud applications, corporate information can be stored in more places and shared more widely than ever. Together, these trends of BYOD, remote ...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Great CASB: Part Three
    What You Need For Mobile Security In Part Two, we discussed the capabilities needed for the cloud security of organizations operating in the modern business world. While these features are necessary, they are not sufficient for complete cybersecurity. As companies continue to embrace BYOD, employees will be making greater use of their personal mobile devices for work purposes. Because of this, en...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Great CASB: Part Two
    How to Best Secure the Cloud In Part One, we discussed modern business trends like the move to the cloud, BYOD, the shared responsibility model of security, and how each of them necessitates the use of a cloud access security broker (CASB). CASB platforms typically leverage proxies and cloud apps’ APIs to protect data across cloud apps. CASBs that use forward and reverse proxies can monitor and d...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Rise of the CASB
    The cloud access security broker (CASB) market has changed drastically over the last few years. As more and more organizations move to the cloud and make use of cloud applications, they are faced with the reality that their IT departments are ultimately responsible for protecting data at rest in the cloud and on endpoints that have access to that data. Unfortunately, while many cloud apps feature ...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Great CASB: Part One
    Why You Need a CASB Now more than ever, enterprises are turning to the cloud. By using IaaS and SaaS applications, companies are able to gain a number of benefits that are unavailable with rigid, traditional solutions. For example, migrating to the cloud allows firms to cut down on the costs associated with having in-house infrastructure and larger IT teams. In addition to this cost benefit, incr...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Verizon Breach: How Cloud Encryption Can Save Your Data
    As has been widely reported, Verizon is the latest enterprise to be hit with a large-scale data breach. Over 14 million customer records were left exposed due to a misconfiguration in Verizon’s Amazon Web Services (AWS) instance. Among the leaked information were logs containing customer names, cell phone numbers, and account PINs. Had this data fallen into the hands of hackers, even the most secu...
Bitglass, Inc.
Bitglass, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Empowering the Cloud Through G Suite
    Adoption of G Suite has increased year over year. Despite this increased adoption, securing data still remains a challenge as employees want access to cloud apps from any device, anywhere. In this webinar, we will discuss the the security gaps within G Suite and how to give power back to your security team through tools that provide visibility and control of your data across all of your cloud ap...
Bitglass, Inc.
Bitglass, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • securing the cloud for financial services
    Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they face heavier regulations than many other enterprises. As cloud adoption continues to spread within the industry, financial services firms must be particularly focused on ensuring cybersecurity. However, this means that they can no longer rely on traditional, on-premi...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Key to Ransomware Disaster Recovery? Secure Unmanaged Devices
    The recent ransomware attacks that ravaged organizations around the globe last week have brought sudden attention to a longstanding problem. Few enterprises today are prepared for a ransomware attack and while most discussions focus on detection capabilities, disaster recovery is often overlooked. Disaster recovery strategies have always focused on server side failures – datacenters going offline,...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Glass Class: The Malware Maze
    Cyber attacks on sensitive data have made far too many headlines in the recent weeks. Each attack differs in execution, but one thing is often the same - malware is making its way into the network and it's spreading like wildfire.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.