Sundaram Lakshmanan, CTO, CipherCloud & Matt Hines, VP and Evangelist, CipherCloud
If the overnight expansion of the remote workforce has taught us one lesson, it is that improving data protection for cloud apps has become the primary challenge facing today’s security practitioners.
In fact, one might easily conclude that - based on the massive strategic benefits appreciated by increased cloud adoption and remote access - in the very near future many organizations may seek to offload responsibility for just about every manner of security, save user and data-centric protection. So what does this mean for security architects, management and operational staff as we move quickly toward that “cloud everything” future?
Clearly, organizations will require stronger methods for protecting cloud data, along with user and device access when traditional network, hardware and app stack defenses have become largely outmoded. Further, as more users log into the cloud to collaborate via both managed and unmanaged devices, extended cloud security capabilities will need to account for key considerations including:
- How to protect against inappropriate data access and handling while enabling open shares across the huge range of sensitive company data?
- How to account for user and device security posture to thwart emerging threats that seek to exploit compromised accounts and endpoints?
- How to ensure proper enforcement and remediation when issues do arise, including the ability to encrypt or wipe information as it moves off the cloud?
In this best practices webinar, join us to discuss the hugely important challenge of addressing the confluence of cloud, user, data, and device security in the name of enabling the real-time collaboration required by today’s remote workforce. Along with the involved challenges and use cases, we’ll outline dedicated CASB solutions use cases and best practices that address this specific set of real-world challenges.