Hi [[ session.user.profile.firstName ]]

Comparing CASB Technologies: What's the Difference?

Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.
Recorded Jun 3 2020 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jacob Serpa
Presentation preview: Comparing CASB Technologies: What's the Difference?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • (APAC) The Best of Both Worlds: CASB + IAAS (Azure) Aug 12 2020 1:30 am UTC 60 mins
    Jacob Serpa
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, organizations must be certain that they are deploying the proper tools that allow them to secure their use of these platforms. Failure to do so can be catastrophic.
  • The Best of Both Worlds: CASB + IAAS (Azure) Aug 5 2020 5:00 pm UTC 60 mins
    Jacob Serpa
    Infrastructure-as-a-service (IaaS) platforms have revolutionized the way that businesses operate. Led by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), IaaS has become indispensable for any modern enterprise. However, organizations must be certain that they are deploying the proper tools that allow them to secure their use of these platforms. Failure to do so can be catastrophic.
  • (APAC) Securing SaaS with Bitglass: Microsoft Teams, Slack, and Webex Jul 21 2020 1:30 am UTC 60 mins
    Prasidh Srikanth
    Improving productivity and collaboration for employees while working from home has never been more important. Microsoft teams, Slack and Webex are a few of the communication platforms that are enabling this digital transformation. Perimeter based defenses are no longer able to cater to the paradigm shift of these cloud delivered products. Prasidh Srikanth, Director of Product Management at Bitglass, will make the case that cloud delivered security solutions are the way to protect the crown jewels of the enterprises while setting up remote workers for success.
  • BYOD, the Cloud, and CASB – How to Secure the Modern Workforce Recorded: Jul 14 2020 31 mins
    William Houcheime
    Bring your own device (BYOD) is a commonly used approach to business that organizations in various industries enable because it provides employees with greater mobility and productivity. However, if it is not protected with the proper security tools, organizations can be susceptible to data leakage. Our 2020 BYOD report offers a closer look at what organizations are doing to enable employees to use their personal devices without compromising data security.
  • Why CASB is the New Firewall for the Cloud Recorded: Jul 8 2020 63 mins
    Jonathan Andresen & Frankie Lim
    Cloud access security brokers (CASBs) have become go-to solutions for securing cloud and mobile. They help organizations to govern the use of the cloud and protect sensitive data across applications, devices and networks.
  • Comparing CASB Technologies: What's the Difference? Recorded: Jul 7 2020 59 mins
    Jacob Serpa
    Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.
  • (EMEA) Bitglass & AWS: Advance Your IaaS Security with CASB Recorded: Jul 1 2020 43 mins
    Ben Rice & Lee Fox
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
  • (APAC) Bitglass & AWS: Advance Your IaaS Security with CASB Recorded: Jul 1 2020 43 mins
    Ben Rice & Lee Fox
    Cloud computing is here to stay. Infrastructure-as-a-service (IaaS) platforms such as Amazon Web Services (AWS) have not only transformed the IT landscape, but are redefining enterprise data security.
  • Legal Firms Adopting Cloud and Mobile Working Strategies Recorded: Jun 23 2020 57 mins
    David Shephard
    IT teams inside law firms must balance how to protect confidential and private data while simultaneously delivering a work environment that is remote, highly collaborative and increasingly cloud and mobile centric.

    The technologies relied on for desk and datacentre based working were not designed for cloud and don’t extend well to the cloud. With data and users routinely beyond the firewall and device preference becoming a choice for users, the IT architecture has completely changed. Security architecture must change too.

    In this interactive webinar event Dave Shephard, VP APAC at Bitglass will speak on the common challenges customers face as they move to cloud and what practical steps legal firms can take to protect their data, while reducing overhead and delivering a positive experience to their users.
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA) Recorded: Jun 2 2020 33 mins
    Samantha Nguyen
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these development projects to fruition at market. However, the use of such cloud tools means that new security solutions and strategies are needed in order to keep data safe.

    As the Next-Gen Cloud Access Security Broker, Bitglass is perfectly positioned to help organizations protect their data in these and other SaaS apps.

    In this webinar, you will learn:
    - The ins and outs of securing Confluence, Jira, and Salesforce with Bitglass
    - What steps can be taken to allow only proper access to these applications
    - How to ensure that data at rest in the cloud is secure
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (APAC) Recorded: Jun 2 2020 32 mins
    Samantha Nguyen
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these development projects to fruition at market. However, the use of such cloud tools means that new security solutions and strategies are needed in order to keep data safe.

    As the Next-Gen Cloud Access Security Broker, Bitglass is perfectly positioned to help organizations protect their data in these and other SaaS apps.

    In this webinar, you will learn:
    - The ins and outs of securing Confluence, Jira, and Salesforce with Bitglass
    - What steps can be taken to allow only proper access to these applications
    - How to ensure that data at rest in the cloud is secure
  • How to secure remote workers and data at access (EMEA) Recorded: May 14 2020 33 mins
    Raif Mehmet & Steve Butts
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data outside of traditional boundaries.

    Join this webinar to learn how to:
    - Enable the short term surge in remote workers while preparing for a future “normal”
    - How to secure your data, applications, and web interactions from advanced threats
    - Secure BYOD devices while enabling productivity
    - Identify new access patterns and differentiate between malicious and benign behaviors
  • Remote Worker Alert! Who Moved My VPN and Why Should I Care? Recorded: May 14 2020 54 mins
    Wayne Phillips / Jonathan Andresen
    Remote working is the new-normal. The sudden and unplanned growth in remote working finally exposes the limitations of legacy architectures created largely by cloud service providers. It’s 2020 – isn’t there a better way to support remote workers without retooling all of IT?

    Modern IT allows users to work from anywhere, on any device, on any cloud app and across any network with full control and visibility into all data – no matter where it resides.

    Join this exclusive web event to learn how innovative IT organizations are:

    1) Supporting remote workers at scale while future-proofing their IT in the age of cloud;
    2) Securing all users working from any device, on any app across any network;
    3) Improving workforce productivity by embracing high-speed home and mobile internet; and
    4) Taking the cost out of IT by fast tracking digital and cloud transformation.
  • How to secure remote workers and data at access Recorded: May 13 2020 38 mins
    Kevin Sheu
    The world has just observed a surge in remote workers in an era where remote work was already fast approaching. In the long term, we will observe a complex environment that sees an expansion of devices, geographic points of access and access to data outside of traditional boundaries.

    Join this webinar to learn how to:
    - Enable the short term surge in remote workers while preparing for a future “normal”
    - How to secure your data, applications, and web interactions from advanced threats
    - Secure BYOD devices while enabling productivity
    - Identify new access patterns and differentiate between malicious and benign behaviors
  • A Cloud Security Checkup: CASBs in Healthcare Recorded: May 6 2020 34 mins
    Juan Lugo, Product Marketing Manager, Bitglass
    Healthcare organizations process and store protected health information (PHI), which is composed of patients’ personal data and attracts a lot of attention from cybercriminals. In its sixth annual Healthcare Breach Report, Bitglass analyzed breaches in healthcare and uncovered the state of security for such organizations in 2019. Naturally, a variety of security concerns were uncovered. Fortunately, cloud access security brokers (CASBs) are well equipped to ensure security and compliance for healthcare firms in the cloud.

    In this webinar, you will learn:

    - The state of security in healthcare, from cost per breached record to the leading causes of breaches.

    - How organizations can pursue HIPAA compliance in the cloud.

    - How Bitglass’ CASB can help your organization protect data wherever it goes.
  • Cloud and SASE - Continued Disruption (APAC) Recorded: May 5 2020 32 mins
    Nat Kausik and Mike Schuricht
    SASE, the latest hot topic in cybersecurity, stands for secure access service edge. SASE refers to the consolidation of security solutions and the evolving IT ecosystem in which organizations operate today. In a world where mobile device access, remote work, and cloud-based tools are the norm, organizations must think differently about security. Anytime, anywhere data access must be secured through context-aware solutions that enforce policies based on users’ identities, devices, requested services, and more. Fortunately, SASE offerings are intelligent, multi-faceted security platforms that can apply granular security measures across an organization’s entire IT ecosystem. Naturally, this means that these platforms must be built for and in the cloud.
  • Avoiding Backhauling & Bottlenecks in Cloud Security:The Polyscale Architecture Recorded: Apr 8 2020 39 mins
    Nat Kausik & Mike Schuricht
    In this webinar, we consider how cloud security architectures and business models affect scalability, uptime and performance. Specifically, we examine why some security architectures are robust and deliver high performance, while others are sluggish and prone to repeated outages.

    In this webinar you will learn:
    - The importance of securing cloud data with tools like CASBs
    - Where standard cloud security architectures fall short
    - How the Polyscale Architecture is perfectly attuned to modern organizations’ security needs
  • Cloud Security Essentials – Bitglass and Zscaler Recorded: Mar 25 2020 51 mins
    Ben Rice (Bitglass) and Rahim Ibrahim (Zscaler)
    Today’s workforce expects to be able to perform their work duties in any app, any device, anywhere. As such, security teams are tasked with a difficult job--data is no longer confined behind the corporate perimeter and the on-premises security technology stack.

    Now security teams have to protect devices, identities, applications, and data wherever they go.

    Join this webinar to learn:
    - SASE (Secure Access Service Edge)--what is it and why are SWG (Secure Web Gateway) and CASB(Cloud Access Security Broker) the place to start.
    - How your organization can secure the complex mix of personal and corporate devices in use today.
    - How to verify users' identities and secure access to enterprise IT resources.
    - How to secure a variety of cloud applications that employees use to perform their work duties.
    - How to protect data wherever it goes.
  • Securing the Exploding Cloud Footprint Recorded: Feb 12 2020 40 mins
    Juan Lugo, Product Marketing Manager, Bitglass
    With the plethora of applications that organizations use on a daily basis, how does one sort and choose which apps to enforce policies on? Which apps are sanction worthy or should be immediately blocked? Additionally, while firewall and proxy logs catch the traffic of users, identifying what needs attention in such comprehensive logs can be paralyzing for IT personnel. Shadow IT discovery enables organizations to narrow down the search to apps that should be more closely monitored ,controlled and in many cases – blocked. So what are some of the criteria to consider when choosing a cloud access security broker? Tune in to learn more.
  • SASE: Security for the Cloud & from the Cloud Recorded: Dec 11 2019 50 mins
    Mike Schuricht, VP of Product at Bitglass
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:

    What exactly is a SASE?
    How are CASB and SWG evolving?
    Real-world use cases for organizations securing SASE
Bitglass: Next-Gen CASB
Bitglass, the Next-Gen CASB company, is based in Silicon Valley with offices worldwide. The company's cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Comparing CASB Technologies: What's the Difference?
  • Live at: Jun 3 2020 5:00 pm
  • Presented by: Jacob Serpa
  • From:
Your email has been sent.
or close