Ajmal Kohgadai

Product Marketing Manager

AWS Security Configuration Checklist

Amazon Web Services (AWS), the leader in the public cloud infrastructure-as-a-service (IaaS) market, offers a...

By Ajmal Kohgadai | August 27, 2018

7 Reasons Why Microsoft Warns Against Proxy-Based CASBs for Office 365

When deploying a cloud access security broker (CASB) to secure sanctioned cloud services, such as...

By Ajmal Kohgadai | August 20, 2018

New Gartner Report: Don’t Let Cloud Migration Flip Your Network

The analyst firm Gartner recently published a report titled “Don’t Let Cloud Migration Flip Your...

By Ajmal Kohgadai | July 30, 2018

How McAfee’s CASB Integrates with McAfee Endpoint DLP

McAfee Endpoint DLP is a critical defense for any organization looking to secure endpoint devices...

By Ajmal Kohgadai | June 22, 2018

How McAfee’s CASB Integrates with McAfee Web Gateway

McAfee Web Gateway is a critical defense for any organization looking to protect against emerging...

By Ajmal Kohgadai | May 25, 2018

McAfee Named a 2018 Gartner Peer Insights Customers’ Choice for Cloud Access Security Brokers (CASB)

Skyhigh Networks (now part of McAfee) was the first cloud access security broker (CASB) provider...

By Ajmal Kohgadai | May 15, 2018

Gartner’s 10 Best Practices for Successful CASB Projects

The cloud access security broker (CASB) market has been around for 5 years. Since its...

By Ajmal Kohgadai | November 15, 2017

IDC MarketScape Report Assesses CASB Vendors

The cloud security gateway (CSG) market—also known as cloud access security brokers (CASB)—continues to grow...

By Ajmal Kohgadai | October 23, 2017

Securing Sanctioned Cloud Services: 5 CASB Use Cases

Sanctioned cloud services such as Office 365, Salesforce, Box, and Slack are used in business-critical...

By Ajmal Kohgadai | September 6, 2017

New eBook: Deployment Architectures for the Top 20 CASB Use Cases

With the exponential growth of the cloud in recent years, many enterprises are finding themselves...

By Ajmal Kohgadai | August 21, 2017

21 AWS Security Groups Best Practices

In AWS, security groups act as a virtual firewall that regulates inbound/outbound traffic for service...

By Ajmal Kohgadai | August 10, 2017

8 AWS CloudTrail Best Practices for Governance, Compliance, and Auditing

The recent AWS data leaks from the Verizon (via Nice Systems), the RNC (via Deep...

By Ajmal Kohgadai | July 21, 2017

Gartner Report: How to Enhance Office 365 Security

One of the primary reasons enterprises hesitate to migrate their on-premises IT deployments to the...

By Ajmal Kohgadai | June 21, 2017

13 AWS IAM Best Practices for Security and Compliance

Amazon takes the security of its services and resources very seriously. One of the areas...

By Ajmal Kohgadai | May 31, 2017

AWS Shared Responsibility Model for Security and Compliance

As enterprises look to achieve greater operational efficiency and gain a competitive advantage, they are...

By Ajmal Kohgadai | May 9, 2017

51 AWS Security Best Practices

In 2014, an attacker compromised Code Spaces’ Amazon Web Services (AWS) account used to deploy...

By Ajmal Kohgadai | April 8, 2017

New eBook – Definitive Guide to AWS Security

While popular out-of-the-box SaaS products like Salesforce, Box, Dropbox, and Office 365 are becoming ubiquitous...

By Ajmal Kohgadai | April 4, 2017

6 Office 365 DLP Best Practices Everyone Must Follow

Much has been written about the rapid pace at which enterprises are adopting Microsoft Office...

By Ajmal Kohgadai | March 30, 2017

6 Slack Security Best Practices

Since its launch in August of 2013, Slack has enjoyed remarkable growth in its user...

By Ajmal Kohgadai | March 27, 2017

12 Must-Know Statistics on Cloud Usage in the Enterprise

Over the past decade, the cloud has become a disruptive force affecting every function and...

By Ajmal Kohgadai | March 9, 2017