What Are Cloud Access Security Brokers (CASBs)?

Security Image

What Are Cloud Access Security Brokers?

Security is, I would say, our top priority because for all the exciting things you will be able to do with computers – organizing your lives, staying in touch with people, being creative – if we don’t solve these security problems, then people will hold back.” – Bill Gates

Cloud Access Security Brokers, known as CASBs, are opening a brand new window into our everyday security and safety with regard to information and high-technology trends. Increasingly, cloud-focused applications and services applied by enterprises are going to be kept much more secure with the help of CASB platforms by 2016.

Gartner Inc., has recently announced a top 10 technological advances for information security. Here they are:

1) Cloud Access Security Brokers – cloud-based points, which are used for security policy enforcement purposes, and are placed between cloud Service Providers and cloud service consumers.

2) Adaptive Access Control – a type of control with context awareness access.

3) Pervasive Sandboxing (Content Detonation) and IOC Confirmation – a great option to detect intrusions as soon as possible, and to reduce hackers’ chances to cause damage to sensitive information.

4) Endpoint Detection and Response Solutions – used to record numerous network events and endpoints, and store the information in a centralized database.

5) Big Data Security Analytics at the Heart of Next-generation Security Platforms – a fine option for storing your monitoring data to carry out retrospective analysis.

6) Machine-readable Threat Intelligence, Including Reputation Services – a form of real-time and dynamic rating to be used for the integration with intelligence feeds and external context.

7) Containment and Isolation as a Foundational Security Strategy – an excellent means to create a defense-in-depth protection for enterprise systems.

8) Software-defined Security – aims at moving the intelligence and value into software.

9) Interactive Application Security Testing – used to provide a higher level of accuracy of application security testing via the interaction of the DAST (dynamic application security testing) and SAST (static application security testing) techniques.

10) Security Gateways, Brokers and Firewalls to Deal with the Internet of Things – associated with the Internet of Things and directed towards providing security and protection for future interconnected devices, sensors and systems, which will mainly be controlled without human involvement.

Below, you can find an interesting infographic on CASBs provided by bitglass.com

Cloud Access Security Brokers

By Lilit Melkonyan

Alex Dean
Enabling Privacy and Personalization Most businesses today rely on data collected online to better understand their customers and deliver more personalized products, services and experiences. These insights can be transformative for an organization, especially when ...
Yuliya Melnik
DevOps Services Outsourcing The sooner you release your unique idea to the public, the higher the chance that it will receive the lion's share of the audience's attention. Delays in development can lead competitors to ...
Gary Bernstein
Most Dangerous Botnets While it’s no secret that the technical sophistication of cyber-attacks grows exponentially, adversaries often need widespread networks to make it happen. One of the ways to do that is to infect legitimate ...
Dana Gardner
Just as cloud computing initially seeped into organizations under the cloak of shadow IT, application programming interface (API) adoption has often followed an organic, inexact, and unaudited path. IT leaders know they’re benefiting from APIs -- ...
Dana Gardner
Low-code Development Has Entered a Maturity Spurt Closing the gap between the applications and services a company needs -- and the ones they can actually produce -- has long been a missing keystone for attaining ...