Hi [[ session.user.profile.firstName ]]

Bitglass

  • Date
  • Rating
  • Views
  • Are CASBs Ready for Primetime? Are CASBs Ready for Primetime? Michael Ball, CISO at AGF Investments & Rich Campagna, VP of Products at Bitglass Recorded: Nov 2 2016 46 mins
    Enterprises are migrating to the cloud in droves, taking advantage of lower costs, easy deployment, and improved infrastructure security. Protecting data in the cloud, however, remains a challenge as employees push to access cloud apps from any device, anywhere.

    In this webinar, Michael Ball, CISO at AGF Investments and Rich Campagna, VP of Products at Bitglass, will discuss the evolution of Cloud Access Security Brokers (CASBs), from app discovery tools to mature solutions that now provide deep visibility and control over data across all cloud apps. Michael and Rich will also highlight real-world CASB deployments and how major organizations are leveraging these solutions to protect data end to end, from cloud to device.
  • The 4 Security Horsemen of the Office 365 Apocalypse The 4 Security Horsemen of the Office 365 Apocalypse Ben Kepes, Technology Evangelist and Subject Matter Expert & Rich Campagna, VP of Products for Bitglass Recorded: Oct 12 2016 58 mins
    We're now a couple of solid years into the apocalypse that is ushering in the collapse of premises-based email and productivity suites - mass adoption of Office 365 across every major industry. Despite this momentum, security and compliance remain top challenges. This webinar, featuring Ben Kepes, prolific journalist and security subject matter expert, and Rich Campagna, VP of Products at Bitglass, will introduce the 4 security horsemen of the Office 365 apocalypse - cloud, mobile, identity and access.

    With emphasis on practical and immediately useful advice, Ben and Rich will cover the top concerns like unmanaged device access and external sharing, mitigating controls, and will give examples of how other organizations have adopted Office 365 and lived to tell the tale.
  • Drawbacks of MDM Drawbacks of MDM Salim Hafid, Product Marketing Manager Recorded: Sep 28 2016 2 mins
    Why has MDM adoption stagnated? Privacy, user experience, and the growing popularity of agentless mobile security.
  • Webinar Express: Securing BYOD Without MDM Webinar Express: Securing BYOD Without MDM Rich Campagna, VP Products, Bitglass Recorded: Sep 14 2016 29 mins
    As employee-owned devices become the norm in the workplace, organizations without the appropriate security infrastructure lose control and visibility over corporate data accessed from these devices. Enabling secure BYOD has thus become one of the greatest challenges facing IT leaders.

    Mobile device management (MDM), seen by many as cumbersome and invasive, have struggled to see meaningful adoption among employees. Instead, enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. In this webinar, we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
  • Office 365 Security: How to safeguard your data Office 365 Security: How to safeguard your data Greg Schaffer, CISO for FirstBank & Rich Campagna, VP of Products for Bitglass Recorded: Aug 31 2016 54 mins
    Public cloud apps like Office 365 are being widely adopted in every major industry, with security & compliance at the top of the list of concerns. In this webinar, Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, will provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and will give examples of how your peers have responded to the cloud security challenge.
  • Webinar Express: What is a CASB? Webinar Express: What is a CASB? Salim Hafid, Product Marketing Manager Recorded: Aug 10 2016 30 mins
    Join us for our monthly Bitglass Webinar Express - 30 minutes start to finish.

    As more organizations look to deploy new or additional cloud apps to enable employee productivity, securing corporate data becomes a challenge. Cloud Access Security Brokers (CASBs) have emerged as the go-to solution for organizations that need end-to-end data security, from cloud to device. In fact, Gartner has identified CASBs as the top technology for information security in 2016 because such solutions mitigate the risks posed by enabling corporate data access from any device, anywhere.

    In this webinar, we'll explore:
    -The gaps in cloud app security that result in data leakage and how CASBs fill these gaps.
    -What makes CASBs different from security solutions built natively into cloud apps like Office 365.
    -How CASBs integrate with existing identity and DLP solutions you may have in place.
    -What CASBs can do to protect data on unmanaged devices.

    Join us to learn how a CASB can help you meet your security and compliance requirements.
  • Cloud Encryption: When 256-bit AES Isn't as Strong as Advertised Cloud Encryption: When 256-bit AES Isn't as Strong as Advertised Rich Campagna, VP Products, Bitglass Recorded: Jul 29 2016 4 mins
    Learn about the shortcuts some vendors take in implementing 256-bit AES for cloud encryption.
  • Developing a Secure and Compliant Cloud Strategy for Financial Services Developing a Secure and Compliant Cloud Strategy for Financial Services Mike Schuricht, Director of Product Management & Salim Hafid, Product Marketing Manager Recorded: Jun 29 2016 53 mins
    For financial services firms eager to migrate to the cloud, security and compliance requirements can pose a challenge. Personally identifiable information (PII) and non-public information (NPI) is often entrusted to financial services orgs with the expectation that access be limited, that the data be encrypted, and that activity involving that sensitive information be monitored. In fact, mandates including GLBA and PCI DSS require that firms maintain control over both data residency and privacy, capabilities that are not the focus for most cloud app vendors.

    In this webinar, we'll discuss the essential components of a complete cloud security strategy and the tools that can help protect financial data in any cloud app. Learn how Cloud Access Security Brokers (CASBs) implement full-strength encryption for data-at-rest in Salesforce, provide contextual access controls, apply content-aware DLP to sensitive customer data, and more.
  • Major Trends Transforming BYOD Security Major Trends Transforming BYOD Security Rich Campagna, VP Products, Bitglass Recorded: Jun 15 2016 41 mins
    By all accounts, support for BYOD is growing rapidly across all industries as IT leaders respond to end-user demands. Adoption, however, has stagnated due to privacy concerns, cumbersome third-party apps required to secure mobile devices, and issues supporting the latest operating systems.

    In this webinar, we will discuss the major trends that are reshaping the mobile landscape, from changing end-user needs to the shift toward data-centric security. Learn how IT leaders across all major sectors are rethinking their approach to mobile security to keep pace with evolving employee behaviors.

    CPE Credit available for attendance.
  • 8 questions to ask when evaluating a Cloud Access Security Broker 8 questions to ask when evaluating a Cloud Access Security Broker Rich Campagna, VP Products, Bitglass Recorded: Jun 9 2016 54 mins
    With adoption of Office 365, Google Apps, and others up massively in the last year, IT leaders are curious to know which features are most commonly used by your peers to protect corporate data in a cloud-first world.

    In this webinar, we’ll discuss the questions every IT leader should ask when evaluating a cloud security solution. As many know, not all cloud security products are created equal. Some provide real-time protection while others can only offer next-day alerts after sensitive files have already been compromised. Join us to learn how best to evaluate Cloud Access Security Brokers.