Hi [[ session.user.profile.firstName ]]

Securing the Exploding Cloud Footprint

With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs catch the traffic of users, identifying what needs attention in such comprehensive logs can be paralyzing for IT personnel. Shadow IT discovery enables organizations to narrow down the search to apps that should be more closely monitored ,controlled and in many cases – blocked. So what are some of the criteria to consider when choosing a cloud access security broker? Tune in to learn more.
Recorded Feb 12 2020 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Juan Lugo, Product Marketing Manager, Bitglass
Presentation preview: Securing the Exploding Cloud Footprint

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Bitglass Insider Threat Report 2020: How Your Enterprise Should Respond Sep 2 2020 5:00 pm UTC 60 mins
    Juan Lugo
    In this webinar, you will learn:
    - The state of security for organizations wrestling with insider threats;
    - How various security capabilities can help IT and security teams to respond; and
    - How SASE platforms like Bitglass can help your enterprise defend against insider threats.
  • How to Address the Top 5 CISO Priorities Aug 19 2020 5:00 pm UTC 60 mins
    Nat Kausik
    Given the global pandemic and the sudden shift in how the workforce operates, the CISO community has faced an unprecedented set of challenges and questions. Several months into the transition, new struggles continue to arise, while many of the original ones remain unanswered.
  • (APAC) The Best of Both Worlds: CASB + IAAS (Azure) Recorded: Aug 12 2020 54 mins
    Jacob Serpa
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, organizations must be certain that they are deploying the proper tools that allow them to secure their use of these platforms. Failure to do so can be catastrophic.
  • (EMEA) Securing SaaS with Bitglass: Microsoft Teams, Slack, and Webex Recorded: Aug 11 2020 42 mins
    Prasidh Srikanth
    Improving productivity and collaboration for employees while working from home has never been more important. Microsoft teams, Slack and Webex are a few of the communication platforms that are enabling this digital transformation. Perimeter based defenses are no longer able to cater to the paradigm shift of these cloud delivered products. Prasidh Srikanth, Director of Product Management at Bitglass, will make the case that cloud delivered security solutions are the way to protect the crown jewels of the enterprises while setting up remote workers for success.
  • The Best of Both Worlds: CASB + IAAS (Azure) Recorded: Aug 5 2020 59 mins
    Jacob Serpa
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, organizations must be certain that they are deploying the proper tools that allow them to secure their use of these platforms. Failure to do so can be catastrophic.
  • Sécurité du Cloud en temps réel dans le contexte du travail à distance Recorded: Jul 28 2020 33 mins
    Valentin Jangwa et Nicolas Liard
    Le monde vient d'observer une augmentation importante du travail à distance à une époque où sa mise en place démarrait.
    À plus long terme, nous observons un environnement de travail plus complexe à sécuriser avec une augmentation des équipements, des points d'accès géographiques et des accès aux données, en dehors du cadre standard.

    "Rejoignez ce Webinaire pour mieux appréhender :

    1) La rapide montée en puissance du Travail à distance.
    2) La sécurité des appareils non gérés dits BYOD pour augmenter la productivité
    3) la distinction des comportements malveillants et des comportements bénins en analysant le contexte et le contenu
    4) le contrôle des Applications Cloud
  • BYOD, the Cloud, and CASB – How to Secure the Modern Workforce Recorded: Jul 14 2020 31 mins
    William Houcheime
    Bring your own device (BYOD) is a commonly used approach to business that organizations in various industries enable because it provides employees with greater mobility and productivity. However, if it is not protected with the proper security tools, organizations can be susceptible to data leakage. Our 2020 BYOD report offers a closer look at what organizations are doing to enable employees to use their personal devices without compromising data security.
  • Why CASB is the New Firewall for the Cloud Recorded: Jul 8 2020 63 mins
    Jonathan Andresen & Frankie Lim
    Cloud access security brokers (CASBs) have become go-to solutions for securing cloud and mobile. They help organizations to govern the use of the cloud and protect sensitive data across applications, devices and networks.
  • Comparing CASB Technologies: What's the Difference? Recorded: Jul 7 2020 59 mins
    Jacob Serpa
    Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.
  • (EMEA) Bitglass & AWS: Advance Your IaaS Security with CASB Recorded: Jul 1 2020 43 mins
    Ben Rice & Lee Fox
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
  • (APAC) Bitglass & AWS: Advance Your IaaS Security with CASB Recorded: Jul 1 2020 43 mins
    Ben Rice & Lee Fox
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
  • Legal Firms Adopting Cloud and Mobile Working Strategies Recorded: Jun 23 2020 57 mins
    David Shephard
    IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.

    The technologies relied on for desk and datacentre based working were not designed for cloud and don’t extend well to the cloud. With data and users routinely beyond the firewall and device preference becoming a choice for users, the IT architecture has completely changed. Security architecture must change too.

    In this interactive webinar event Dave Shephard, VP APAC at Bitglass will speak on the common challenges customers face as they move to cloud and what practical steps legal firms can take to protect their data, while reducing overhead and delivering a positive experience to their users.
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA) Recorded: Jun 2 2020 33 mins
    Samantha Nguyen
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these development projects to fruition at market. However, the use of such cloud tools means that new security solutions and strategies are needed in order to keep data safe.

    As the Next-Gen Cloud Access Security Broker, Bitglass is perfectly positioned to help organizations protect their data in these and other SaaS apps.

    In this webinar, you will learn:
    - The ins and outs of securing Confluence, Jira, and Salesforce with Bitglass
    - What steps can be taken to allow only proper access to these applications
    - How to ensure that data at rest in the cloud is secure
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (APAC) Recorded: Jun 2 2020 32 mins
    Samantha Nguyen
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these development projects to fruition at market. However, the use of such cloud tools means that new security solutions and strategies are needed in order to keep data safe.

    As the Next-Gen Cloud Access Security Broker, Bitglass is perfectly positioned to help organizations protect their data in these and other SaaS apps.

    In this webinar, you will learn:
    - The ins and outs of securing Confluence, Jira, and Salesforce with Bitglass
    - What steps can be taken to allow only proper access to these applications
    - How to ensure that data at rest in the cloud is secure
  • How to secure remote workers and data at access (EMEA) Recorded: May 14 2020 33 mins
    Raif Mehmet & Steve Butts
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data outside of traditional boundaries.

    Join this webinar to learn how to:
    - Enable the short term surge in remote workers while preparing for a future “normal”
    - How to secure your data, applications, and web interactions from advanced threats
    - Secure BYOD devices while enabling productivity
    - Identify new access patterns and differentiate between malicious and benign behaviors
  • Remote Worker Alert! Who Moved My VPN and Why Should I Care? Recorded: May 14 2020 54 mins
    Wayne Phillips / Jonathan Andresen
    Remote working is the new-normal. The sudden and unplanned growth in remote working finally exposes the limitations of legacy architectures created largely by cloud service providers. It’s 2020 – isn’t there a better way to support remote workers without retooling all of IT?

    Modern IT allows users to work from anywhere, on any device, on any cloud app and across any network with full control and visibility into all data – no matter where it resides.

    Join this exclusive web event to learn how innovative IT organizations are:

    1) Supporting remote workers at scale while future-proofing their IT in the age of cloud;
    2) Securing all users working from any device, on any app across any network;
    3) Improving workforce productivity by embracing high-speed home and mobile internet; and
    4) Taking the cost out of IT by fast tracking digital and cloud transformation.
  • How to secure remote workers and data at access Recorded: May 13 2020 38 mins
    Kevin Sheu
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data outside of traditional boundaries.

    Join this webinar to learn how to:
    - Enable the short term surge in remote workers while preparing for a future “normal”
    - How to secure your data, applications, and web interactions from advanced threats
    - Secure BYOD devices while enabling productivity
    - Identify new access patterns and differentiate between malicious and benign behaviors
  • A Cloud Security Checkup: CASBs in Healthcare Recorded: May 6 2020 34 mins
    Juan Lugo, Product Marketing Manager, Bitglass
    Healthcare organizations process and store protected health information (PHI), which is composed of patients’ personal data and attracts a lot of attention from cybercriminals. In its sixth annual Healthcare Breach Report, Bitglass analyzed breaches in healthcare and uncovered the state of security for such organizations in 2019. Naturally, a variety of security concerns were uncovered. Fortunately, cloud access security brokers (CASBs) are well equipped to ensure security and compliance for healthcare firms in the cloud.

    In this webinar, you will learn:

    - The state of security in healthcare, from cost per breached record to the leading causes of breaches.

    - How organizations can pursue HIPAA compliance in the cloud.

    - How Bitglass’ CASB can help your organization protect data wherever it goes.
Bitglass: Next-Gen CASB
Bitglass, the Next-Gen CASB company, is based in Silicon Valley with offices worldwide. The company's cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing the Exploding Cloud Footprint
  • Live at: Feb 12 2020 6:00 pm
  • Presented by: Juan Lugo, Product Marketing Manager, Bitglass
  • From:
Your email has been sent.
or close