{"id":5712,"date":"2021-09-07T21:55:08","date_gmt":"2021-09-07T21:55:08","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5712"},"modified":"2021-09-07T21:59:04","modified_gmt":"2021-09-07T21:59:04","slug":"cloud-access-security-broker-casb","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5712","title":{"rendered":"Cloud Access Security Broker (CASB)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5712\" class=\"elementor elementor-5712\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-38ac92f9 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"38ac92f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-378f8f0b ot-flex-column-vertical\" data-id=\"378f8f0b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-147b0f6e elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"147b0f6e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-54a22ebe ot-flex-column-vertical\" data-id=\"54a22ebe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64dfce53 elementor-widget elementor-widget-iheading\" data-id=\"64dfce53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ CLOUD ACCESS SECURITY BROKER (CASB)<\/span>\r\n\t        <h2 class=\"main-heading\">Improve Visibility Of Your Cloud Assets<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6e714bfb elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"6e714bfb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-59dbb576 ot-flex-column-vertical\" data-id=\"59dbb576\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4dc87e6d elementor-widget elementor-widget-text-editor\" data-id=\"4dc87e6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>How many cloud applications are your users using now? A dozen? Maybe 24? According to the Cloud Security Alliance, almost all IT managers think they are running less than 50 applications when the reality is closer to 500. Shadow IT has been a powerful enabler for end users \u2013 but is a nightmare for IT managers. Many users aren\u2019t even aware they are using cloud services. Cloud now goes well beyond copying a file to a personal Dropbox or emailing a half-completed document to finish at home.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aa42c3 elementor-widget elementor-widget-spacer\" data-id=\"6aa42c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dd3a00 elementor-widget elementor-widget-image\" data-id=\"2dd3a00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"500\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cloud-access.jpg\" class=\"attachment-full size-full wp-image-2523\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cloud-access.jpg 1920w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cloud-access-300x78.jpg 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cloud-access-1024x267.jpg 1024w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cloud-access-768x200.jpg 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cloud-access-1536x400.jpg 1536w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cloud-access-720x188.jpg 720w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-67ad0d55 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"67ad0d55\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56681e6f ot-flex-column-vertical\" data-id=\"56681e6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1eeee3e7 elementor-widget elementor-widget-toggle\" data-id=\"1eeee3e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-5181\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-5181\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Challenges with Cloud<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-5181\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-5181\"><p>Cloud is subtle and ubiquitous as illustrated by the following examples you may be familiar with:<br \/>\u2022 The marketing intern needs 50,000 customized letters printed. The printing company now has a new \u2018print to cloud\u2019 application. A spreadsheet of all your customer data is uploaded into the web application. What happens to it after it\u2019s printed?<br \/>\u2022 A senior executive is in a business negotiation. He takes notes \u2013 both minutes and his personal thoughts on Evernote. When he\u2019s done, the notes automatically sync. Where? To the cloud?<br \/>\u2022 A business development manager enters all his accounts\u2019 details into his Android phone. The phone is company issued but he also signs in using his personal Gmail account. When he leaves the company, his access to Salesforce is revoked immediately and he hands back the phone. But when he buys a new phone and logs into it, what will Google do? Repopulate his contacts from the cloud?<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-5182\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-5182\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cloud Comes with Increased Security Risks<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-5182\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-5182\"><p>While most data leaks happen despite well-intended staff activities, employee everyday actions can cause huge headaches for IT managers and result in increased security risks for your organization.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-5183\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-5183\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Tap into CASB To Manage Cloud Use<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-5183\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-5183\"><p>If you haven\u2019t put controls in place to detect and stop unauthorized cloud use, it\u2019s time to take stock. This is where Cloud Access Security Brokers (CASB) can help. CASB works as a gatekeeper extending your security policies beyond your infrastructure. CASBs enable you to discover how serious the problem is in your organization so you can take appropriate action \u2013 before it\u2019s too late.<\/p><p>Want to know more about Cloud Access Security Brokers and how we can help you with that?<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ CLOUD ACCESS SECURITY BROKER (CASB) Improve Visibility Of Your Cloud Assets How many cloud applications are your users using now? A dozen? Maybe 24? According to the Cloud Security Alliance, almost all IT managers think they are running less than 50 applications when the reality is closer to 500. Shadow IT has been a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5712","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5712"}],"version-history":[{"count":7,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5712\/revisions"}],"predecessor-version":[{"id":5720,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5712\/revisions\/5720"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}