How is CASB different from other cloud security solutions?

By isircar ·
Tags: Cloud, Security
What are the different solutions available to secure data in a multi-cloud environment? Do Cloud Access Security Brokers (CASBs) really provide a holistic cloud security solution?
Thread display: Collapse - | Expand +

All Answers

Collapse -


by SparrowJ In reply to How is CASB different fro ...

CASB is a separate, and differentiated market from proxies and firewalls. Unlike network security solutions that focus on a wide variety of inbound threats and filtering for millions of potentially illicit websites, a CASB is focused on deep visibility into and granular controls for cloud usage.

Collapse -

CASBs secure sensitive data across SaaS, cloud and remote workforce

by neerajnitw In reply to How is CASB different fro ...

Remote workforce is driving the adoption of cloud, and organizations are in need of a comprehensive cloud security solution that can provide 360-degree visibility and control over the collaboration happening across multiple cloud apps and end-user devices. The true assessment of a cloud security solution is hinged on its ability to identify and protect sensitive data hosted in the cloud as it gets accessed, shared and downloaded from any location and any device. In this regard, no solution secures the cloud applications as comprehensively as the Cloud Access Security Brokers or CASBs. The term CASB was coined by Gartner in 2012, and though there are multiple Gartner definitions of CASB existing on public forums, one of the simplest one goes as "products and services that address the security gaps in an organization's cloud usage".

CASBs provide an unmatched depth of cloud security and data protection features that enable organizations to seamless deploy remote workforce environment, while being compliant with the local and global data protection and privacy laws, such as HIPAA, GDPR, CCPA, etc. Following are some of the key capabilities of CASB+ that differentiates it from perimeter focused security solutions such as, Web Application Firewalls, Secure Web Gateways and Web Proxies:

Visibility: Monitor and govern the usage of Shadow IT resources in your organization, with deep visibility into user activity and unsanctioned cloud usage.

Data Protection: Identify, classify and protect the sensitive data being uploaded to the cloud, or downloaded from the cloud using inline and API based DLP, encryption, data masking and rights management. Sensitive content can include PII, PHI, PCI etc.

Threat Protection: Cloud-born malwares are on the rise, and can bypass the conventional security policies of endpoint security systems. With CASBs you can perform a deep scan of all incoming and outgoing traffic for malicious content or infected files, and take appropriate actions. With UEBA and Adaptive Access Controls, organizations can pinpoint anomalous user behavior and block their access in real-time.

Compliance: Complying to the ever-growing list of data privacy laws (CCPA, GDPR, HIPAA, GLBA, and more) is one of the biggest challenges for industries migrating to the cloud. CASBs selectively encrypt or tokenize the sensitive data as per the compliance guidelines, allowing business to seamlessly navigate through the complex web of data compliance laws.

Related Discussions

Related Forums