What Are Cloud Access Security Brokers (CASBs)?

What Are Cloud Access Security Brokers?

Security is, I would say, our top priority because for all the exciting things you will be able to do with computers – organizing your lives, staying in touch with people, being creative – if we don’t solve these security problems, then people will hold back.” – Bill Gates

Cloud Access Security Brokers, known as CASBs, are opening a brand new window into our everyday security and safety with regard to information and high-technology trends. Increasingly, cloud-focused applications and services applied by enterprises are going to be kept much more secure with the help of CASB platforms by 2016.

Gartner Inc., has recently announced a top 10 technological advances for information security. Here they are:

1) Cloud Access Security Brokers – cloud-based points, which are used for security policy enforcement purposes, and are placed between cloud Service Providers and cloud service consumers.

2) Adaptive Access Control – a type of control with context awareness access.

3) Pervasive Sandboxing (Content Detonation) and IOC Confirmation – a great option to detect intrusions as soon as possible, and to reduce hackers’ chances to cause damage to sensitive information.

4) Endpoint Detection and Response Solutions – used to record numerous network events and endpoints, and store the information in a centralized database.

5) Big Data Security Analytics at the Heart of Next-generation Security Platforms – a fine option for storing your monitoring data to carry out retrospective analysis.

6) Machine-readable Threat Intelligence, Including Reputation Services – a form of real-time and dynamic rating to be used for the integration with intelligence feeds and external context.

7) Containment and Isolation as a Foundational Security Strategy – an excellent means to create a defense-in-depth protection for enterprise systems.

8) Software-defined Security – aims at moving the intelligence and value into software.

9) Interactive Application Security Testing – used to provide a higher level of accuracy of application security testing via the interaction of the DAST (dynamic application security testing) and SAST (static application security testing) techniques.

10) Security Gateways, Brokers and Firewalls to Deal with the Internet of Things – associated with the Internet of Things and directed towards providing security and protection for future interconnected devices, sensors and systems, which will mainly be controlled without human involvement.

Below, you can find an interesting infographic on CASBs provided by bitglass.com

Cloud Access Security Brokers

By Lilit Melkonyan

Episode 1: Why Small and Medium Sized Businesses Need an MSP

Small and Medium Sized Businesses Need an MSP Small and medium-sized businesses don’t enjoy the ...

Episode 6: Cloud Migration: Why It’s More Important Than Ever

The Importance of Cloud Migration Moving fully to the cloud is still a concern for ...

Episode 5: How the Pandemic is Changing Business and the Cloud

An Interview with Ed Dryer of Steadfast With the global pandemic wreaking havoc on business ...
Employees Digital

A Winning Data Strategy Series Part 1: Off to a Faulty Start

A Winning Data Strategy Series This is the first piece of a 5-part series on plugging the obvious but overlooked gaps in achieving digital success ...
Patrick Joggerst

Session Border Control as a Service: Faster, More Secure and Dramatically Less Complex Enterprise Communications

Session Border Control as a Service As businesses are increasingly moving to cloud-based unified communications (UC) for improved collaboration and productivity, they must also ensure ...
Jen Klostermann

Telemedicine to medical smartphone applications

Telemedicine to medical smartphone applications With the current and growing worldwide concerns regarding the Coronavirus (COVID 19). Telemedicine is more important now than ever. What ...
Future Fintech

What’s the cloud forecast for 2020?

Tech Agnosticism In 2019, we saw how cloud computing transformed the way data is managed, the way applications are developed and deployed, and also the ...
Fig 2

Leveraging machine learning models for predictive maintenance of network services

Leveraging machine learning models As per lightreading's service assurance and analytics research study conducted with 100+ network operators and service providers, nearly 40% reported that ...
Building a Robust Virtual Agent (VA) Rollout Strategy for DSPs

Building a Robust Virtual Agent (VA) Rollout Strategy for DSPs

Building a Robust Virtual Agent (VA) Rollout Strategy for DSPs Proven methods to increase VA containment & customer satisfaction The virtual agent’s market is at ...
Steve Prentice

Episode 3: The Bottomless Cloud – An Interview with David Friend of Wasabi

Why data is not “the new oil” and why “cloud” means more than we think. In his new book, author David Friend refers to the ...
Mark Kirstein

IT Pros Can Now Deliver a More Streamlined, Cost-Efficient Migration of Microsoft Teams

IT Pros Deliver a More Streamlined Migration of Microsoft Teams In the modern workplace, the ability for employees to collaborate and engage with each other ...
Oussama El Hilali

Hybrid or Multi-cloud? Picking the Right Organizational IT Strategy

Hybrid or Multi-cloud? Picking the Right Cloud Strategy Discussions around cloud migration are no longer about whether an organization should move to the cloud, but ...
Aarti Parikh

Serverless Multi-Tier Architecture on AWS

Serverless Multi-Tier Architecture Multi-tier Architecture Multi-tier Architecture is also known as n-tier architecture. In such architecture, an application is developed and distributed in more than ...