Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Great CASB: Part Three
    What You Need For Mobile Security In Part Two, we discussed the capabilities needed for the cloud security of organizations operating in the modern business world. While these features are necessary, they are not sufficient for complete cybersecurity. As companies continue to embrace BYOD, employees will be making greater use of their personal mobile devices for work purposes. Because of this, en...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Great CASB: Part Two
    How to Best Secure the Cloud In Part One, we discussed modern business trends like the move to the cloud, BYOD, the shared responsibility model of security, and how each of them necessitates the use of a cloud access security broker (CASB). CASB platforms typically leverage proxies and cloud apps’ APIs to protect data across cloud apps. CASBs that use forward and reverse proxies can monitor and d...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Rise of the CASB
    The cloud access security broker (CASB) market has changed drastically over the last few years. As more and more organizations move to the cloud and make use of cloud applications, they are faced with the reality that their IT departments are ultimately responsible for protecting data at rest in the cloud and on endpoints that have access to that data. Unfortunately, while many cloud apps feature ...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Great CASB: Part One
    Why You Need a CASB Now more than ever, enterprises are turning to the cloud. By using IaaS and SaaS applications, companies are able to gain a number of benefits that are unavailable with rigid, traditional solutions. For example, migrating to the cloud allows firms to cut down on the costs associated with having in-house infrastructure and larger IT teams. In addition to this cost benefit, incr...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Verizon Breach: How Cloud Encryption Can Save Your Data
    As has been widely reported, Verizon is the latest enterprise to be hit with a large-scale data breach. Over 14 million customer records were left exposed due to a misconfiguration in Verizon’s Amazon Web Services (AWS) instance. Among the leaked information were logs containing customer names, cell phone numbers, and account PINs. Had this data fallen into the hands of hackers, even the most secu...
Bitglass, Inc.
Bitglass, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Empowering the Cloud Through G Suite
    Adoption of G Suite has increased year over year. Despite this increased adoption, securing data still remains a challenge as employees want access to cloud apps from any device, anywhere. In this webinar, we will discuss the the security gaps within G Suite and how to give power back to your security team through tools that provide visibility and control of your data across all of your cloud ap...
Bitglass, Inc.
Bitglass, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • securing the cloud for financial services
    Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they face heavier regulations than many other enterprises. As cloud adoption continues to spread within the industry, financial services firms must be particularly focused on ensuring cybersecurity. However, this means that they can no longer rely on traditional, on-premi...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • The Key to Ransomware Disaster Recovery? Secure Unmanaged Devices
    The recent ransomware attacks that ravaged organizations around the globe last week have brought sudden attention to a longstanding problem. Few enterprises today are prepared for a ransomware attack and while most discussions focus on detection capabilities, disaster recovery is often overlooked. Disaster recovery strategies have always focused on server side failures – datacenters going offline,...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Glass Class: The Malware Maze
    Cyber attacks on sensitive data have made far too many headlines in the recent weeks. Each attack differs in execution, but one thing is often the same - malware is making its way into the network and it's spreading like wildfire.
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • passing the baton...
    After a dozen years in academia and research, and twenty years as a start-up CEO across a handful of companies, the time has come for me to retire.  And pass the baton to the next generation.  
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Gartner: CASBs Still Reign as Top Security Tech
    I spent most of last week in the company of a few thousand of my closest security friends at the Gartner Security & Risk Management Summit in National Harbor, MD. For the third year running, CASBs were the talk of the show! Gartner VP Neil MacDonald, amongst others, talked up the fact that CASBs are now entering mainstream adoption, a Fortune 25 Bitglass customer was featured in a video testimonia...
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Backdoor for Malware?
    Recently, a global airline deployed Bitglass.  The firm had strong solutions in place for malware and threat protection.  Top-shelf "Next-Gen" firewalls.  Yet, what they found surprised them.
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Are Your Sync Clients Really Safe?
    Box introduced their new client sync app today called Box Drive. The desktop app will allow enterprise users to access all Box files directly from the desktop, saving time and money. While apps like Box Drive make accessing data easier, they introduce a major means of data leakage if not properly secured. Enterprises using these apps have few means of controlling which users and devices are able t...
Bitglass, Inc.
Bitglass, Inc.
Blog Post
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • Fast and Frenzied Cloud Adoption
    Every day, the cloud becomes more and more of a necessary tool for businesses. Enterprises continually migrate to the cloud for lower costs and greater flexibility. As more firms do so, making the transition becomes a necessity to keep up with competition. In light of the utility the cloud provides, one may wonder how many companies are actually making use of it. 
Bitglass, Inc.
Bitglass, Inc.
Blog Post

New blog articles detected.

  • CASB, no bull
      Our sales rep in Boston called.  Got a strange tale to tell he said.  Braved morning traffic dressed like a penguin...
Bitglass, Inc.
Bitglass, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Webinar bitglass - complete deck-2
    We are now three plus years into widespread adoption across industries of public SaaS apps like Office 365. Despite this momentum, security and compliance remain top challenges. This webinar, featuring Matt Hollcraft, CISO for Maxim Integrated, Dave Ruedger, Chief Security Architect for Maxim Integrated, and Rich Campagna, SVP of Products for Bitglass, will help you build a 2017 action plan to em...
Bitglass, Inc.
Bitglass, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Mitigating the Top 5 Cloud Security Threats
    By now you are likely familiar with Cloud Access Security Brokers (CASBs) and understand how they fit into your broader security and cloud strategy. What should organizations be looking for in a CASB? What capabilities are here or on the horizon that can provide improved data protection in the cloud? Bitglass and (ISC)2 presents the final episode of the CASB series where we will examine where c...
Bitglass, Inc.
Bitglass, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Security O365 Using AI-based Advanced Threat Protection
    Office 365 has garnered widespread adoption from enterprises due to its advantages such as ease of deployment, lower TCO, and high scalability. Additionally, it enables end-users to work and collaborate from anywhere and on any device. Although Office 365 enables IT to shift the burden for app and infrastructure to the cloud vendor, data security remains the responsibility of the enterprise. Give...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.