SlideShare ist ein Scribd-Unternehmen logo
1 von 27
The Future of CASBs
A Cloud Security Force Awakens
cloud & mobile drive data outside the firewall...
...leaving traditional security technologies ineffective
problem
STORYBOAR
the dark side
enterprises can’t rely solely on native app security
enterprise
(CASB)
end-user devices
visibility & analytics
data protection
identity & access control
application
storage
servers
network
a new hope
webinar 1 recap
STORYBOAR
shadow
IT
the clone wars
in the beginning… shadow IT was all we knew
STORYBOAR
shadow
IT
API-based
approach
revenge of the sith
API based solutions were touted as “the only way”
STORYBOAR
shadow
IT
API-based
approach
API + in-
line
a new hope
The Rebels emerged with an new way to secure SaaS apps
poll
which of the
following security
functions is
most critical?
the security
menace
webinar 2 recap
STORYBOAR
the cloud security menaces
benefits outweigh drawbacks, but risks remain
■ Lack of visibility and control over sensitive
data
■ Difficult to identify malicious activity
■ Easy external sharing can result in
unauthorized access
■ Cloud extends access to risky unmanaged
devices
STORYBOAR
deployed in over a third of organizations, office 365 is
office 365 is the leading SaaS productivity suite
2015
google apps
office 365
other
16.3%
7.7%
76%
22.8%
25.2%
52%
40.7%
24.5%
34.8%
2016
STORYBOAR
this is not the dlp you’re looking for
office 365 native dlp
■ BYOD blindspot - O365 DLP focused on data-at-
rest
■ High operational overhead - Complex to configure
■ High cost - Must have top of the line license
■ Point solution - Support focused on O365, what
about other cloud apps?
poll
what are your
office 365
migration plans?
a cloud security
force awakens
the future of
CASBs
STORYBOAR
CASB
solution
component
s
cloud mobile discovery
STORYBOAR
the future of CASB security
a data-centric approach
o365 requires a new force with new security
architecture
■ Cross-device, cross-app agentless data
security
■ Real-time data protection
■ Limit high-risk activities like external file
sharing, unmanaged access
■ User behavior analytics
STORYBOAR
Reverse Proxy
ActiveSync
Proxy
Forward Proxy
AccessControl
DataProtection
Watermarking,Encryption,
DLP,DRM
Cloud
Encryption
Identity: integrated SSO & SAML proxy
API
Integration
Analytics & Visibility
managed devices
visibility + control
unmanaged devices
visibility + control
technology
Breach (Malware, TOR…) Shadow IT
out-of-band
in-band
components of a complete CASB solution
STORYBOAR
agentless real-time inline data protection
reverse proxy
futuristic CASB approach
■ no software or configuration
■ resilience to SaaS app updates
■ privacy - only corporate traffic inspected
legacy CASB approach
■ inline control requires software agent
■ hard-coded proxy rules break on SaaS app updates
STORYBOAR
futuristic CASB approach
■ secure email, contacts & calendar
■ agentless
■ selective wipe, device encryption, PIN etc
■ privacy - only corporate traffic inspected
legacy CASB approach
■ no native ActiveSync support
agentless security on any mobile device
activesync proxy
STORYBOAR
data leakage prevention
integrated high-performance engine
futuristic CASB approach
■ high performance, comprehensive matching
■ advanced remediation
■ optional ICAP to on-prem DLP engine
legacy CASB approach
■ no native DLP engine
■ black or white allow/block decisions
STORYBOAR
futuristic CASB approach
■ public or private cloud flexibility
■ auto-scaling and replication
■ fully redundant architecture
■ global load balancing
legacy CASB approach
■ proprietary bottlenecks and infrastructure
scalable infrastructure
high availability, geo-load balancing
STORYBOAR
common office 365 policy
hybrid approach to protect data on any device
managed
devices
application access mode data protection
unmanaged
devices /
byod
in the cloud
● profile-agent
● VPN+IP-restriction
● DLP/DRM/encryption
● Device controls (e.g PIN)
● Agentless Selective Wipe
● Client apps: block
● OneDrive
● Sharepoint
● Yammer
● APIs
● Quarantine
● Encrypt with on-prem key
● Block external shares
● Alert on DLP events
Legacy Auth
Apps
(e.g Office 2010)
● Full access
Modern Auth Apps
(e.g Office 2013+)
● profile agent
● VPN+IP-restriction
● client certificate check
● Full access
● Browser
● ActiveSync Mail
● Client apps
● Reverse-proxy + AJAX-
VM
● ActiveSync Proxy
STORYBOAR
challenge
■ Ensure OneDrive usage is HIPAA-compliant
■ Prevent leakage of PII and PHI
■ Maintain end user privacy
■ Enforce data security policies on managed and
unmanaged devices
solution
■ Real-time inline data protection on any device
■ Block downloads of PHI and PII to unmanaged
devices
■ Agentless BYOD with selective wipe
■ Ability to support future enterprise-wide SaaS
deployments
180,000
users
secure office
365 + byod
healthcare
giant
STORYBOAR
secure
salesforce +
office 365
24
financial
services
giant
client
■ $6T in assets
■ Subject to GLB, PCI-DSS, privacy laws that vary
by region
challenge
■ Reduce risk presented by enterprise-wide
Salesforce and Office 365 migration
■ Control Salesforce data residency
solution
■ Maintenance of full Salesforce frontend and
backend functionality
■ Preserve SOQL API integrations
■ Full control of encryption keys
■ Bidirectional remediation of customer PII and
PIFI in Sharepoint and Yammer
STORYBOAR
■ access control
• distinguish between managed and unmanaged devices?
■ unmanaged devices
• real-time control of data flow without agents?
• support rich functionality, e.g. in-browser editing of docs?
■ mobile devices
• secure BYOD without agents?
■ breach discovery
• discover both exfiltration threats & Shadow IT?
■ security architecture
• dilute standards, e.g. does proxy of passwords increase phishing risk?
proof of concept checklist
key tests in choosing a CASB
STORYBOAR
about
bitglass
est. jan
2013
tier 1
VCs
250+
customers
total
data
protection
outside the firewall
...may the force be with you
STORYBOAR
bitglass.com
@bitglass

Weitere ähnliche Inhalte

Was ist angesagt?

Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
Netskope
 

Was ist angesagt? (20)

CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Comprehensive Information on CASB
Comprehensive Information on CASBComprehensive Information on CASB
Comprehensive Information on CASB
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1Workshop: Threat Intelligence - Part 1
Workshop: Threat Intelligence - Part 1
 
8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
Trust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai PlatformTrust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai Platform
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 

Ähnlich wie The Future of CASBs - A Cloud Security Force Awakens

Ähnlich wie The Future of CASBs - A Cloud Security Force Awakens (20)

CASBs: Critical Capabilities - in partnership with ISC(2)
CASBs: Critical Capabilities - in partnership with ISC(2)CASBs: Critical Capabilities - in partnership with ISC(2)
CASBs: Critical Capabilities - in partnership with ISC(2)
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365
 
Bridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond MediaBridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond Media
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
 
Developing a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial ServicesDeveloping a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial Services
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
20180120 spsbre - we are moving to the cloud what about security
20180120   spsbre - we are moving to the cloud what about security20180120   spsbre - we are moving to the cloud what about security
20180120 spsbre - we are moving to the cloud what about security
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 

Mehr von Bitglass (6)

Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

The Future of CASBs - A Cloud Security Force Awakens

  • 1. The Future of CASBs A Cloud Security Force Awakens
  • 2. cloud & mobile drive data outside the firewall... ...leaving traditional security technologies ineffective problem
  • 3. STORYBOAR the dark side enterprises can’t rely solely on native app security enterprise (CASB) end-user devices visibility & analytics data protection identity & access control application storage servers network
  • 5. STORYBOAR shadow IT the clone wars in the beginning… shadow IT was all we knew
  • 6. STORYBOAR shadow IT API-based approach revenge of the sith API based solutions were touted as “the only way”
  • 7. STORYBOAR shadow IT API-based approach API + in- line a new hope The Rebels emerged with an new way to secure SaaS apps
  • 8. poll which of the following security functions is most critical?
  • 10. STORYBOAR the cloud security menaces benefits outweigh drawbacks, but risks remain ■ Lack of visibility and control over sensitive data ■ Difficult to identify malicious activity ■ Easy external sharing can result in unauthorized access ■ Cloud extends access to risky unmanaged devices
  • 11. STORYBOAR deployed in over a third of organizations, office 365 is office 365 is the leading SaaS productivity suite 2015 google apps office 365 other 16.3% 7.7% 76% 22.8% 25.2% 52% 40.7% 24.5% 34.8% 2016
  • 12. STORYBOAR this is not the dlp you’re looking for office 365 native dlp ■ BYOD blindspot - O365 DLP focused on data-at- rest ■ High operational overhead - Complex to configure ■ High cost - Must have top of the line license ■ Point solution - Support focused on O365, what about other cloud apps?
  • 13. poll what are your office 365 migration plans?
  • 14. a cloud security force awakens the future of CASBs
  • 16. STORYBOAR the future of CASB security a data-centric approach o365 requires a new force with new security architecture ■ Cross-device, cross-app agentless data security ■ Real-time data protection ■ Limit high-risk activities like external file sharing, unmanaged access ■ User behavior analytics
  • 17. STORYBOAR Reverse Proxy ActiveSync Proxy Forward Proxy AccessControl DataProtection Watermarking,Encryption, DLP,DRM Cloud Encryption Identity: integrated SSO & SAML proxy API Integration Analytics & Visibility managed devices visibility + control unmanaged devices visibility + control technology Breach (Malware, TOR…) Shadow IT out-of-band in-band components of a complete CASB solution
  • 18. STORYBOAR agentless real-time inline data protection reverse proxy futuristic CASB approach ■ no software or configuration ■ resilience to SaaS app updates ■ privacy - only corporate traffic inspected legacy CASB approach ■ inline control requires software agent ■ hard-coded proxy rules break on SaaS app updates
  • 19. STORYBOAR futuristic CASB approach ■ secure email, contacts & calendar ■ agentless ■ selective wipe, device encryption, PIN etc ■ privacy - only corporate traffic inspected legacy CASB approach ■ no native ActiveSync support agentless security on any mobile device activesync proxy
  • 20. STORYBOAR data leakage prevention integrated high-performance engine futuristic CASB approach ■ high performance, comprehensive matching ■ advanced remediation ■ optional ICAP to on-prem DLP engine legacy CASB approach ■ no native DLP engine ■ black or white allow/block decisions
  • 21. STORYBOAR futuristic CASB approach ■ public or private cloud flexibility ■ auto-scaling and replication ■ fully redundant architecture ■ global load balancing legacy CASB approach ■ proprietary bottlenecks and infrastructure scalable infrastructure high availability, geo-load balancing
  • 22. STORYBOAR common office 365 policy hybrid approach to protect data on any device managed devices application access mode data protection unmanaged devices / byod in the cloud ● profile-agent ● VPN+IP-restriction ● DLP/DRM/encryption ● Device controls (e.g PIN) ● Agentless Selective Wipe ● Client apps: block ● OneDrive ● Sharepoint ● Yammer ● APIs ● Quarantine ● Encrypt with on-prem key ● Block external shares ● Alert on DLP events Legacy Auth Apps (e.g Office 2010) ● Full access Modern Auth Apps (e.g Office 2013+) ● profile agent ● VPN+IP-restriction ● client certificate check ● Full access ● Browser ● ActiveSync Mail ● Client apps ● Reverse-proxy + AJAX- VM ● ActiveSync Proxy
  • 23. STORYBOAR challenge ■ Ensure OneDrive usage is HIPAA-compliant ■ Prevent leakage of PII and PHI ■ Maintain end user privacy ■ Enforce data security policies on managed and unmanaged devices solution ■ Real-time inline data protection on any device ■ Block downloads of PHI and PII to unmanaged devices ■ Agentless BYOD with selective wipe ■ Ability to support future enterprise-wide SaaS deployments 180,000 users secure office 365 + byod healthcare giant
  • 24. STORYBOAR secure salesforce + office 365 24 financial services giant client ■ $6T in assets ■ Subject to GLB, PCI-DSS, privacy laws that vary by region challenge ■ Reduce risk presented by enterprise-wide Salesforce and Office 365 migration ■ Control Salesforce data residency solution ■ Maintenance of full Salesforce frontend and backend functionality ■ Preserve SOQL API integrations ■ Full control of encryption keys ■ Bidirectional remediation of customer PII and PIFI in Sharepoint and Yammer
  • 25. STORYBOAR ■ access control • distinguish between managed and unmanaged devices? ■ unmanaged devices • real-time control of data flow without agents? • support rich functionality, e.g. in-browser editing of docs? ■ mobile devices • secure BYOD without agents? ■ breach discovery • discover both exfiltration threats & Shadow IT? ■ security architecture • dilute standards, e.g. does proxy of passwords increase phishing risk? proof of concept checklist key tests in choosing a CASB