The business transformation that we’ve seen cloud applications fuel over the past few years is inspiring, and continues to drive us to evolve our Cloud Access Security Broker to enable new areas of growth for our customers. CASB is a fundamental element of enterprise security, and has the potential to feed and improve other areas of enterprise security with its cloud context and enforcement points.

As we provide visibility and control over data in the cloud, we can also think about these capabilities in the context of other sources of data in motion and at rest, primarily the devices we all use to engage with the cloud. Our latest advancement in this area creates a device-to-cloud data protection framework you can take advantage of to be more efficient in your DLP practice. Specifically, you can:

  • Set up data classifications just once – typically these will be already in place with your endpoint device DLP. Then, just sync with CASB and your cloud DLP speaks the same language.
  • Create just one set of DLP policies – again, many of you will have DLP policies built for your devices already. Today, for data within email, you can sync your policy to CASB with one click, protecting data in Exchange Online or Gmail immediately.
  • Manage incidents from one place – we’ve brought together device and cloud DLP incidents and reporting to one location, so you can view, remediate, and use one set of case management workflows for your environment.

Cloud DLP Cheat Sheet

Learn about cloud DLP best practices to ensure your organization meets internal and external compliance requirements.

Download Now

Next, when we look at drivers of risk in the cloud, we split up our assessment into sanctioned applications – those which you want to enable your users to access, and control with CASB – and the Shadow IT which they find a way to implement themselves. The transformative nature of enabling cloud services can be accomplished by implementing sanctioned apps like Office 365, Box, Slack, Salesforce, and IaaS like AWS or Azure. However, those account for only about 10% of the total cloud ecosystem you have to manage.

For the rest that amounts to Shadow IT, we’ve made it faster to take action through integration with our cloud-based secure web gateway technology. Beyond taking inventory and assessing risk of Shadow IT, which you can do today, from our CASB you can:

  • Block access to the cloud services you don’t want to enable. We’ve created a closed-loop remediation function that allows you to take our Shadow IT risk assessment and create web access policies right from our CASB. These are applied at the secure web gateway, which controls access.
  • Allow access, with the controls you want. For cloud applications with higher risk but a legitimate business case for access, you can limit their functionality, such as blocking uploads/downloads, making a site “read-only”, an example among many options.

Each of these advancements brings CASB into the broader enterprise security ecosystem for more effective and efficient cloud security. It’s time to think of cloud security as a platform, with all the components of security that engage with the cloud talking and working together. This will enable us to move faster as businesses, with even more confidence in our ability to protect our assets in the cloud.