Pinup: Bitglass Brings Strong Data Security To The Cloud

Pinup: Bitglass Brings Strong Data Security To The Cloud

Pinup: Bitglass Brings Strong Data Security To the CloudBitglass_Logo

Living in a world chock full of cloud computing services and companies allows us a much greater degree of freedom in terms of data activity and organization. However, given just how much information is floating around out in cyberspace, the need to secure your company’s data, regardless of where it resides, is of paramount importance.

This area is where cloud-startup, Bitglass, truly shines.

Bitglass is a cloud-computing startup company originally based out of Palo Alto, California. Bitglass has recently emerged from “stealth funding” to reveal a platform that is well able to handle virtually all data protection a company could need. Bitglass has raised over $10 million from venture-capital firms, NEA and Norwest Venture Partners

Nat-NausikAs Nat Kausik, CEO of Bitglass, puts it: “We wanted to separate hype from reality with regard to cloud adoption in the enterprise. We found that while more strategic, company-wide adoption of the cloud is starting to take hold, there are still basic security mechanisms that have not been put into place. As new technologies to secure cloud apps gain footing, we expect accelerated adoption to occur, especially among larger companies and those in regulated industries.

How Does Bitglass Work?

Bitglass’ service-as-a-solution (SaaS) functions as a “reverse proxy,” securing your company’s data both at the credentials level, such as logins and authentications, as well as all data itself. This is accomplished without the need for any additional software to be installed, either at the network level or that of the end user.

Once a user accesses cloud apps that your company uses, Bitglass will automatically redirect them to Bitglass for authentication. This service can be configured in mere minutes, bypassing the need for a lengthy install or configuration process.

Once the authentication through Bitglass is made, all traffic to and from the end user is intercepted by Bitglass and examined for sensitive corporate data, which is then secured. All content, such as URLs and cookies are then automatically rewritten to ensure that the Bitglass proxy is used.

Security permissions can be set by group, location and device type, allowing the most control over which employees can access which data. Tracking is also made much easier, as watermarks are applied to every file accessed by an employee. This watermark contains information like which user is accessing the data, the date the access took place and which transaction utilized the data in question.

While data security is always a concern for any type of company that has sensitive information, the Bitglass service is a sound solution to cut this possibility as much as possible. Whether your company is a mammoth or a simple mom-and-pop business, Bitglass’ products and solutions are sure to satisfy.

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…