Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 2 weeks ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 2 weeks ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 2 weeks ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 2 weeks ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 2 weeks ago

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • What's wrong with agents? Everything.

    Above and below are just a small sample of some of the most recent and helpful reviews on two of the top Mobile Device Management (MDM) vendors in the market (go ahead and look up reviews on the iOS App Store or Google Play store). Why should employees have to suffer  just to be able to access their corporate email and get work done on their mobile devices? Either employees begrudgingly use the ...

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Enabling External Collaboration with a CASB

    Bitglass' Sales Kickoff was this week, our periodic chance to host the global sales team to get everyone trained on the latest and greatest, and pumped about the CASB market opportunity. At each of these events, we host a variety of speakers - technology partners, advisors, investors, channel partners, and customers. 

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • real-time agentless data protection

    Yesterday, we hosted the IT architecture team from a large european financial institution.   They contacted us a few weeks ago, and asked to visit.  Was skeptical that they would actually show up, but they did.    Since it was our annual SKO, much of the company was offsite, leaving me to field the visitors.  

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • How Google Secures G Suite Data

    Google recently released a whitepaper, Google Infrastructure Design Overview, which describes the Google infrastructure and operational model used to deliver services like G Suite in a secure fashion. The whitepaper describes everything from security of the physical infrastructure, to hardware and software, and the processes in place to ensure secure software development across thousands of engine...

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • In EMEA, It's the Year of the Cloud

    Migrating to the cloud is rapidly becoming top-of-mind for many European companies. More organizations are looking to cloud applications like Office 365 and G Suite to lower costs, improve employee productivity, and reduce maintenance burdens on IT staff.

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • 2017 is here. Here's what IT leaders expect.

    Cloud applications are used in over half of enterprises globally and demand is growing rapidly. To better understand the priorities for IT leaders in 2017, we surveyed over 100 executives at the Gartner Symposium on planned deployments, security needs, and more.

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • In Healthcare, mobility is everything

    Doctors rarely make house calls any more, but that does not mean they are desk-bound.    Mobile access to patient and clinical data results in much improved patient outcomes.  But mobility of care givers poses new security and compliance risks, driving CIOs and CISOs to seek technology solutions that can deliver on the promise of secure mobility.

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 1 month ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 1 month ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 1 month ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 1 month ago

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Replacing MSFT Forefront TMG with a CASB

    Despite the fact that Microsoft's ForeFront Threat Management Gateway (TMG) reached end-of-life at the end of December, 2015, there are still a lot of organizations using TMG to provide secure access to applications like Exchange and Sharepoint. If you fall into this bucket, a cloud access security broker (CASB) like Bitglass is one replacement option that you haven't thought of, and a great way t...

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Limitations of Office 365 Data Loss Prevention (DLP)

    As we quickly approach a majority of enterprises using Microsoft Office 365, data leakage prevention (DLP) continues to be a very hot topic. A top question many enterprises have is whether Microsoft's built-in DLP capabilities will suffice or whether they should look to a third party solution, such as a cloud access security broker ( CASB). 

Bitglass, Inc.

Category: Content
Type: SlideShare Presentation

Generated 2 months ago

Slide Share presentations detected

  • The Future of CASBs - A Cloud Security Force Awakens

    By now you are likely familiar with Cloud Access Security Brokers (CASBs) and understand how they fit into your broader security and cloud strategy. What should organizations be looking for in a CASB? What capabilities are here or on the horizon that can provide improved data protection in the cloud? Bitglass and (ISC)2 presents the final episode of the CASB series where we will examine where cl...

  • CASBs - A New Hope

    For enterprises looking to protect cloud app data, Cloud Access Security Brokers (CASBs) have quickly emerged as the go-to solution. But how have CASBs matured and encompassed critical pieces of the security puzzle, from identity management to data leakage prevention? Join Bitglass and (ISC)2 for Episode 1 of the CASB Wars webinar trilogy for a discussion about the evolution of CASBs from app di...

  • CASBs and Office 365: The Security Menace

    Office 365 and other SaaS apps offer a number of advantages over premises-based apps, from easy access and deployment to lower costs. A key advantage of SaaS apps is IT’s ability to shift the burden for app and infrastructure security to the cloud vendor while data security remains the responsibility of the enterprise. Migrating to Office 365 introduces several new avenues for data leakage: one-c...

  • Webinar: are casbs ready for primetime?

    Enterprises are migrating to the cloud in droves, taking advantage of lower costs, easy deployment, and improved infrastructure security. Protecting data in the cloud, however, remains a challenge as employees push to access cloud apps from any device, anywhere. In this webinar, Michael Ball, CISO at AGF Investments and Rich Campagna, VP of Products at Bitglass, will discuss the evolution of Clo...

  • Security and Accountability in the Cloud (in partnership with SANS)

    We explore the findings of the latest SANS cloud security survey and discuss the tools organizations are using to improve cloud security.

  • The Four Horsemen of the O365 Apocalypse

    Learn about the four critical pieces of O365 security and how to mitigate these threats.

  • Office 365 Security: How to Safeguard Your Data

    Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and give examples of how your peers have responded to the cloud security challenge.

  • CASBs and Office 365 (with Argyle)

    Join us to briefly explore key Office 365 and CASB use cases.

  • Bridging the Office 365 Security Gap - Redmond Media

    In partnership with Redmond Media, we explore how Office 365 security is evolving and where a CASB fits into your cloud security strategy.

  • CASB Cases: How Your Peers are Securing the Cloud

    See how organizations are using CASBs for real-time protection, regulatory compliance, BYOD, cloud encryption, and more.

  • Webinar Express: Securing BYOD without MDM

    Learn about the drawbacks of MDM and why an agentless solution offers both the security you need and the privacy employees demand.

  • Top 5 Cloud Security Threats in Healthcare

    As more healthcare organizations move to the cloud, IT leaders must consider new solutions, like CASBs, to mitigate new threats that arise.

  • CSA Research: Mitigating Cloud Threats

    In this webinar, we discuss the results of a joint Bitglass-CSA survey on threats facing enterprises as they migrate to the cloud.

  • The Security Gap: Protecting Healthcare Data in Office 365

    One in three healthcare organizations had a cloud app like Office 365 deployed in 2015, driven by ease of deployment, cost effectiveness, and improved productivity among employees. While cloud app vendors like Microsoft have built robust infrastructure-level security, data security is the enterprise’s responsibility. Healthcare organizations need a cloud security solution that protects PHI end-to...

  • Webinar Express: What is a CASB?

    As more organizations look to deploy new or additional cloud apps to enable employee productivity, securing corporate data becomes a challenge. Cloud Access Security Brokers (CASBs) have emerged as the go-to solution for organizations that need end-to-end data security, from cloud to device.

  • CASBs: 8 Critical Capabilities in partnership with ISMG Media Group

    Learn about the 8 capabilities of CASBs you should consider when evaluating competing solutions.

  • Data-Centric Protection: The Future of BYOD Security

    Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices ...

  • Developing a Secure and Compliant Cloud Strategy for Financial Services

    We discuss the core elements of a CASB - including encryption of data-at-rest in the cloud - and how they apply to financial services orgs looking to adopt the cloud.

  • HIPAA Requirements for Complete Cloud Security

    Learn about the four key HIPAA technical requirements and some of the tools that can help secure the cloud so that your org achieve HIPAA compliance.

  • Major Trends Transforming BYOD Security

    In this webinar, we will discuss the major trends that are reshaping the mobile landscape, from changing end-user needs to the shift toward data-centric security. Learn how IT leaders across all major sectors are rethinking their approach to mobile security to keep pace with evolving employee behaviors.

Bitglass, Inc.

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Hackers Are Home For the Holidays

    With the holiday season already in full swing, people all across the world are sharing their personal and financial information with hundreds of retailers as they scramble to purchase gifts for family and friends. This makes it a perfect time to remember the countless company breaches over the past few holiday seasons and reflect on how enterprises can better protect Payment Card Industry data (PC...

  • Agent-based CASB on Google Apps?

      This week we came upon a pharma customer who had GSuite (aka Google Apps) deployed enterprise-wide. They were shopping for CASB, and were debating the pros and cons of agent-based CASB vs agentless CASB for Gsuite. 

  • Cloud adoption is up again this year. What does that mean for you?

    Earlier this month we released our annual Cloud Adoption Report which once again showed that enterprises are adopting the cloud at astounding rates. In fact, 59% of organizations worldwide now have deployed Office 365 or G Suite. While many have already made the jump from premises-based apps to the cloud, there are a few lingering concerns. Is now the right time? Are cloud apps mature? How do I p...

  • what's so special about a CASB: part five

    Performance and Scalability Cloud Access Security Brokers are becoming an integral piece of organizations’ cloud security strategies. In Part 1 we learned how businesses have evolved to become more mobile and thus required comprehensive data protection that extended beyond the cloud. In Part 2 we covered the importance of real-time inline data protection. In Part 3 we delved into the type of poli...

  • Where does Salesforce platform encryption fall short?

    Salesforce Shield (Salesforce’s platform encryption product) has now been on the market for about a year and a half. The goal is to encrypt data at rest in Salesforce with a bring your own key (BYOK) approach which was introduced in July. The solution sounds great, but doesn’t deliver on the main reasons you would want to encrypt cloud data in the first place.

  • what's so special about a CASB: part four

      Discovery Beyond Shadow IT In Part 3 we learned about Bitglass’ unique capabilities that protect your data in real-time, end-to-end. While in-band security is critical, CASBs aim to provide comprehensive data protection, which includes out-of-band threats. Bitglass’ Breach Discovery solution goes a step beyond identifying Shadow IT apps by detecting all data exfiltration threats, including mal...

  • what's so special about a CASB: part three

    In-Line, Encryption, Identity Management. Oh My! In Part 1 of this series, we explored how cloud security has evolved to encompass cloud apps and unmanaged device access. In Part 2, we learned how Bitglass is the only Cloud Access Security Broker that can provide total data protection in-line and in real-time end-to-end (from the cloud application to any device). So what features does Bitglass pr...

  • Microsoft Teams vs Slack Security

    The big news in the tech world this week is that Microsoft unleashed it's "Slack killer" enterprise team messaging application, appropriately named, Microsoft Teams. Slack, which in just a few short years has grown to over 4 million daily active users, more than 1 million paid users, and a staggering $4 billion valuation, was quick to respond to the announcement with a full page ad in the New Yo...

  • Adding UEBA and Step-up 2FA to Cloud Apps

    Credential compromise and malicious insider activities show up as top priorities in report after report on the state of cloud security in the enterprise. Fortunately, leading Cloud Access Security Brokers (CASBs) offer a set of tools to not only detect, but also prevent these (and other) potential security incidents. Specifically, CASBs offer User and Entity Behavior Analytics (UEBA) to help detec...

  • The Necessity of Secure File Sharing

    Adoption of cloud Enterprise File Sync and Share (EFSS) solutions is happening at a staggering pace in 2016. Companies have many options when deciding which solution to deploy, ranging from dedicated services like Box and Dropbox to more full-featured cloud productivity suites that count EFSS as a component of their feature-set, like Office 365, OneDrive/Sharepoint, and G Suite. Regardless which E...

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 4 months ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 4 months ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 4 months ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 4 months ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 4 months ago

Bitglass, Inc.

Category: Conversion
Type: Landing Page

Generated 4 months ago

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in