Acquisition strategies

CASB News

View All News

CASB Get Started

Bring yourself up to speed with our introductory content

  • Will it last? The marriage between UBA tools and SIEM

    The failure to detect insider threats and a growing need to store and sort through massive amounts of data have drawn attention to user behavior analytics, sometimes called user and entity behavior analytics. According to Gartner, UBA tools deliver value for use cases such as compromised accounts, including stolen and phished credentials. They can also be used to find compromised systems and data exfiltration.

    Security platforms like data loss prevention, endpoint security and cloud access security brokers will increasingly layer or incorporate UBA features to help analyze alerts and make underlying technology more useful, according to analysts. SIEM and UBA are also converging, with SIEM vendors adding UBA tools and UBA vendors building SIEM systems.

    In this issue of Information Security magazine, we look at the dynamics around UBA and strategies for CISOs going forward. UBA vendors are releasing product suites targeted at security operations centers, today built around SIEM. What does the future hold for standalone UBA tools? We look at time to value and use cases, and help you sift through the noise.

     Continue Reading

  • Shadow IT risks still primary driver of CASB use

    Visibility in cloud environments has proved challenging for information security executives tasked with protecting sensitive data and other assets. Continue Reading

  • Bolster your DLP strategy with help from the cloud and CASBs

    As data is increasingly stored in the cloud, it's difficult to maintain a DLP strategy if you're faced with poor data visibility. Find out how you can harness cloud to improve the process. Continue Reading

View All Get Started

Evaluate CASB Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage CASB

Learn to apply best practices and optimize your operations.

  • Skyhigh Networks: Demand for IaaS platform security growing

    Skyhigh Networks' Kamal Shah talks with SearchSecurity about how the CASB market has changed and how his company is tackling IaaS platforms and custom applications. Continue Reading

  • Cloud access security brokers: Hard to tell what's real

    Most cloud access security brokers offer CISOs a way to set policy and gain better understanding of multiple cloud services and data in use across the enterprise. As CASBs have gained momentum in recent years, use cases for them have expanded. Do these tools fill the gaps around visibility and control of software as a service and other cloud services?

    Although cloud service visibility and data leak protection continue to be the biggest drivers, cloud access security brokers can do more than just help with your shadow IT problem and unsanctioned application activity in the cloud.

    Organizations are increasingly looking to use cloud access security brokers to identify anomalies in data movement between on-premises and cloud apps as well as multiple cloud services. Malware identification and encryption of data have become important. More enterprises are also beginning to use CASBs or similar intermediary security technologies to provide some level of security policy management for custom identity-as-a-service platforms.

    In this issue of Information Security magazine, we look at cloud access security brokers and the best ways to evaluate new models, such as infrastructure as a service and platform security.

     Continue Reading

  • CASBs: Why the market and uses are growing

    Cloud access security brokers offer CISOs a way to set policy and gain better understanding of cloud services and data in use across the enterprise. Do these tools fill the gaps? Continue Reading

View All Manage

Problem Solve CASB Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve