CASB (Cloud Access Security Broker) Overview
Вставка
- Опубліковано 29 лип 2024
- Reach out to continue the conversation: smurphy(at)myarg(dot)com
CASBs are becoming critical to protect organizations from data loss in this increasingly cloud services environment. CASBs go beyond traditional solutions by allowing access to cloud services, but limiting or monitoring the activities within the cloud. CASBs allow some user freedom, but only within the policies established by the organization, while blocking shadow IT. - Наука та технологія
Steve, I am floored that you don't have more subscribers. Your content is concise yet thorough and you present in a way that makes the topic accessible to a wide range of audience. This is exactly the type of content we have been looking for. Thank you for creating these videos.
Thanks Gina! Subscribers are growing - it takes time. Thanks very much for the compliment!
Steve - This is useful info. Helped me in understanding CASB uses cases. Thanks.
Glad it was helpful!
Good and easy way to go over CASB, you should update it showing the difference between the reverse proxy and forward proxy deployment
Thank you!
Thanks for explaining so simply. The message landed so clearly!
Glad it was helpful!
Nice Job, and thank you for the content!
Thank you too!
Very nice, concise and sharp video, thanks!
Very welcome!
The DLP functionality of CASB and any policy restrictions to the cloud app can be applied using a secure web gateway itself right? So what is the reason to have it separate for cloud applications?
Product overlap is what SASE is trying to solve. Your capabilities with specific point solutions will vary, but wrapping as many capabilities into a single SASE solution allows you to simplify.
Steve, Do you think CASB is a replacement for MDM? Do CASB providers support mobile devices? Do CASB's enforce the same kind of policies, such as OS version, patching status, ..? Can CASB's wipe a device? Is CASB appropriate for BYOD?
Hello Terra, Thanks for your questions! I think can answer "No" to each of them. Monitors, alerts and controls data flows to various services. I don't consider it a protective service, but a preventative service. Best, Steve