Key Learning Points
- Understand current state of shadow and sanctioned cloud usage
- Learn new security and compliance risks created by the cloud
- Compare on-premises security capabilities to those available in the cloud
- Framework used to enforce cloud security, compliance, and governance policies
- Learn why CASB is Gartner’s #1 security technology for 2015.
The rapid adoption of cloud services has led to a new class of security, compliance, and data governance headaches. Enter the Cloud Access Security Broker or CASB.
The market for CASBs emerged as a result of enterprise IT usage trends brought on from the transition to the cloud and BYOx era. With an on-premise network, IT possesses extensive visibility as well as robust security and policy enforcement controls. The adoption of cloud services and increased access of corporate data from unmanaged devices results in a loss of visibility and control for IT.
We will discuss real-world pain points that drive the need for auditing SaaS usage, securing and monitoring sensitive data in the cloud, and enforcing policies to comply with various internal and external regulatory requirements, and share frameworks enterprises and government agencies have leveraged to gain visibility and control over the cloud.
About Harold Byun
Harold Byun is currently Vice President of Product Management at Skyhigh Networks. Prior to Skyhigh, he worked at MobileIron, Zenprise (acquired by Citrix), and the Vontu/Symantec Data Loss Prevention group. His work in technology has focused on DLP, cloud and mobile application security, data containerization, and security intelligence. He is co-inventor on patented security risk visualization and scoring technology and holds an MBA from the Haas School of Business at UC Berkeley and a BA from Tufts.
Follow Harold on Twitter