Hi [[ session.user.profile.firstName ]]

Bitglass

  • Date
  • Rating
  • Views
  • 5 Most Common CASB Use Cases
    5 Most Common CASB Use Cases Rich Campagna, CMO & VP of Product Management at Bitglass Recorded: Sep 13 2018 47 mins
    Cloud and mobile usage has skyrocketed in many enterprises, introducing many new risks to corporate data. Cloud access security brokers (CASBs) have quickly become go-to solutions for securing apps like Office 365, Salesforce, and AWS.

    However, the wide ranging capabilities of a CASB can make it difficult to identify which use cases are most relevant to your organization’s needs and how these platforms solve critical challenges.

    RSVP for our webinar to learn the 5 most common CASB use cases!
  • Beyond Office 365: How Your Peers are Taming the Long Tail of SaaS Apps
    Beyond Office 365: How Your Peers are Taming the Long Tail of SaaS Apps Salim Hafid, Marketing Manager, Bitglass; Brandon Dunlap (Moderator) Recorded: Aug 9 2018 61 mins
    The long tail of SaaS is growing rapidly. Today, thousands of unmanaged "Shadow IT" applications are used in every major enterprise around the globe and IT departments have little visibility or control over these rogue apps. While the challenge was first simply to secure major SaaS platforms like Office 365, the new reality is a “cloud and mobile-first world” where employees often use new applications that aren’t approved and put corporate data at risk. Join Bitglass and (ISC)2 on August 9, 2018 at 1PM Eastern for the final part of this Security Briefings series where we’ll discuss how leading organizations are evolving their security to solve these challenges, what organizations are prioritizing when evaluating a solution and how zero-day technologies built for a cloud-first world are able to identify, categorize, and secure unknown apps.
  • Securing the Expanding Enterprise Cloud Footprint
    Securing the Expanding Enterprise Cloud Footprint Rich Campagna, CMO & VP of Product Management at Bitglass. Bill Hudson, VP IT at John Muir Health. Thomas August, CISO, JMH Recorded: Jul 24 2018 48 mins
    For John Muir Health (JMH) and other leading healthcare firms, Office 365 is often IT's first foray into the public cloud and the start of a broader initiative to migrate from premises-based applications to cloud. Most are now looking to deploy cloud messaging, file sharing, collaboration apps, and more. Deploying this "long-tail" of SaaS applications shares a great deal with platforms like Office 365, but some considerations are different.

    In this webinar, learn how John Muir Health journeys to secure these lesser known cloud applications and gain actionable advice that you can bring to your organization to protect data in Office 365 and beyond.
  • Mind the Gap: The 5 Most Common Cloud Security Oversights
    Mind the Gap: The 5 Most Common Cloud Security Oversights Jacob Serpa, Product Marketing Manager, Bitglass, Brandon Dunlap (Moderator) Recorded: Jul 12 2018 60 mins
    Even with a renewed focus on security, cloud applications have introduced new risks that many organizations have yet to address. Powerful productivity platforms have been widely deployed in an effort to enable employee communication and facilitate collaboration. Apps enabling employee communication and collaboration cannot be secured with traditional firewalls and gateways. They require a fundamental rethinking of security – a shift from endpoint and network-centric protection to data protection. Join Bitglass and (ISC)2 on July 12, 2018 at 1:00PM Eastern as we explore the five most common security oversights that may put your cloud data at risk.
  • Webinar Express: Cloud Security Must-Haves for HCM
    Webinar Express: Cloud Security Must-Haves for HCM Jacob Serpa, Product Manager Recorded: Jun 12 2018 30 mins
    Human Capital Management (HCM) platforms, like many critical enterprise productivity solutions, are quickly becoming cloud-first platforms. Security is essential for organizations that wish to leverage the power and lower cost of cloud HCM platforms, including Workday and SuccessFactors. Deploying a security solution that provides data and threat protection across all apps can help ensure a swift and seamless transition to cloud-based HCM.

    Join us for a 30 min webinar on June 12th 2018 at 10am PT to discuss:
    - HCM Security Challenges
    - Limitations of native cloud HCM security
    - Protecting HCM apps and data access with CASB
  • Briefings Part 1: CASBs in the Wild - The Most Leveraged Cloud Security Policies
    Briefings Part 1: CASBs in the Wild - The Most Leveraged Cloud Security Policies Salim Hafid, Product Marketing Manager, Bitglass; Brandon Dunlap, Brightfly (Moderator) Recorded: Jun 7 2018 59 mins
    Cloud security is top of mind for all organizations as they migrate to SaaS and IaaS platforms like Office 365 and AWS, but many are grappling with selecting solutions that best balance employee privacy, productivity, and data integrity. While most enterprises are already following security best practices on-premises, few have extended those practices and policies to the cloud. Cloud access security brokers (CASBs) have emerged as the go-to solutions for real-time data and threat protection in the cloud. Purpose-built to solve some of these challenges, CASBs feature a suite of capabilities that can implement granular policies around data at access and at rest. Join Bitglass and (ISC)2 on June 7, 2018 at 1:00PM Eastern for a Security Briefing as we explore the most leveraged security policies necessary to protect corporate data in a cloud and mobile-first world.
  • Webinar Express: Achieving HIPAA Compliance for Office 365
    Webinar Express: Achieving HIPAA Compliance for Office 365 Rich Campagna, CMO and SVP Products at Bitglass Recorded: May 22 2018 36 mins
    As healthcare organizations and healthcare affiliates migrate to cloud services like Office 365, a new approach to security is required to ensure compliance under HIPAA. To maintain compliance in this new cloud environment, healthcare firms need access controls, transmission security, identity management tools, and more. In this webinar, we discuss the critical components of an Office 365 security environment.
  • Webinar Express: Top 5 Office 365 Security Challenges
    Webinar Express: Top 5 Office 365 Security Challenges Jacob Serpa, Product Marketing Manager - Bitglass Recorded: May 16 2018 31 mins
    As a leading SaaS productivity application, Office 365 has seen tremendous adoption in enterprises around the globe for its advantages over premises-based apps, including easy access, rapid deployment, and lower costs. On the security side, organizations that deploy Office 365 effectively shift the burden for app and infrastructure to the cloud vendor. Data security, however, remains the responsibility of your IT team.

    Migrating to Office 365 introduces several new avenues for data leakage: one-click sharing, desktop sync clients, unmanaged device access, and more. Particularly risky for organizations subject to compliance mandates. In this Webinar Express, Jacob Serpa, Product Marketing Manager at Bitglass will detail the top five security challenges facing companies that deploy Office 365, all in 30 minutes or less. Join our live webinar on 5/16 at 10am PT to explore how new approaches to cloud security can help mitigate threats like data loss, malware propagation, and more.
  • Two Steps to the Cloud Security Epiphany: IDaaS and CASB
    Two Steps to the Cloud Security Epiphany: IDaaS and CASB Ben Rice, VP of Business Development at Centrify and Radhika Khatod, Product Manager at Bitglass Recorded: May 3 2018 46 mins
    As the enterprise adopts cloud apps like Office 365, Salesforce, and AWS, developing solid strategies for identity and data protection are the main security and compliance concerns. Increasingly, organizations are leveraging the combination of IDaaS (Identity-as-a-Service) and CASB (Cloud Access Security Broker) to achieve secure cloud enablement. This webinar, hosted by Ben Rice, VP of Business Development at Centrify, and Radhika Khatod, Product Manager at Bitglass, will provide immediately actionable insights into how other organizations are leveraging these technologies to secure their cloud footprints.
  • Webinar Express: 6 Top CASB Use Cases
    Webinar Express: 6 Top CASB Use Cases Salim Hafid, Product Marketing Manager at Bitglass Recorded: Apr 12 2018 33 mins
    Cloud access security brokers (CASBs) have become the go-to solutions for CISOs and security architects looking to protect data in applications like Office 365, Box, G Suite, and AWS. Still, there remains the question of what challenges CASBs solve. Where do next-gen firewalls and secure web gateways fall short? IT leaders often ask: what are the top CASB use cases?

    In this webinar, we explore six of the most common CASB use cases from real-time data loss prevention to threat protection. Learn how leading organizations are leveraging CASB technology to achieve compliance, mitigate zero-day threats, improve visibility over high-risk data outflows, and secure data stored in these new cloud platforms.

Embed in website or blog