SBN

The Four Pillars of CASB: Threat Protection

4P_ThreatProtection

Threat protection, one of the four pillars that makes up Bitglass’s four quadrants, is integral for defense against malware. Bitglass’ CASB (cloud access security broker) can proactively defend against any threat, while other security tools have more of a reactive approach to malware detection and prevention. Oftentimes, months go by without organizations realizing that they have been infected with malware – rather than addressing the problem after the fact, it is best to prevent the attack in real time.

 

There are two ways to classify malware – known and unknown. Known malware, as it has been seen before and the way that it infects organizations is understood, is easier to remediate with standard anti-malware tools. Unknown malware, also known as zero-day malware, is particularly dangerous because it is a brand new threat that the organization and most anti-malware vendors are not aware of. Consequently, these zero-day threats are harder to detect, and standard tools are unable to protect against them. 

First generation CASBs rely on signature-based protection, which is a method that accesses an extensive catalog to identify the type of malware. However, security solutions that only utilize signature based detection are only able to stop threats that have been recorded in the past. Behavior-based protection stops malware proactively, and is capable of protecting against these zero-day threats. Leading CASBs, like Bitglass, utilize behavior based protection to stop known and unknown threats in real-time, without the use of agents.

Bitglass’ zero-day protection identifies threats at rest within applications via their application programming interfaces (APIs). Data-scanning for download and upload is also enabled through agentless reverse proxies that remediate malware in real time. 

Bitglass’ detection and behavior-based tools enable enterprises to defend against any threat. Using a data-centric approach empowers organizations to secure their sensitive data without the need to install agents onto unmanaged devices.

For a deeper look at the impact that malware and data breaches pose on organizations, download the Malware, P.I. – Tracking Cloud Infections report below.

For information about how CASBs like Bitglass secure data, download the Top CASB Use Cases below.

Top CASB Use Cases


*** This is a Security Bloggers Network syndicated blog from Bitglass Blog authored by Juan Lugo. Read the original post at: https://www.bitglass.com/blog/four-pillars-casb-threat-protection