A Perfect Intermediary: APIs

Digitally generated medical interface in blue and black

API? Application Programming Interface? More like A Perfect Intermediary for your data at rest. All jokes aside, using integrations with APIs to combat the potential risks from data at rest can broaden the security scope your organization has.


In just this past month, the Augmenting Compatibility and Competition by Enabling Service Switching (ACCESS) Act was introduced by members of Congress. This bipartisan legislation aims to require large tech vendors, such as Facebook and Google, have their data portable and services interoperable – all of which is done with the use of the cloud apps’ APIs. This growing mission by the government to give third-parties, like cloud access security brokers (CASBs), access to manage data further demonstrates the significance of what’s stored in the cloud. Bills, like the ACCESS Act, are just another stepping stone to offer more control over your organization’s sensitive, out of band data. 

APIs are still already readily available for your security use. While real-time protection is deftly done with proxies, such as Bitglass’ reverse proxy solution, concern remains regarding the sensitive data that already resides in the cloud. Arising requirements include the ability to encrypt or quarantine sensitive data at rest, or to remove external/public sharing from any sensitive files. With API integrations, these security needs can be fulfilled. 

The use of a CASB, like Bitglass, that protects both real-time data and data at rest, enables your organization to have stronger confidence that its data is secure. CASB vendors are churning out additional API integrations to cover the wide SaaS market that consequently brings more and more data into the cloud.

To learn about cloud access security brokers (CASBs) and how they can protect your enterprise from data leakage, malware, and more, download the Top CASB Use Cases below. 

Top CASB Use Cases

*** This is a Security Bloggers Network syndicated blog from Bitglass Blog authored by Samantha Nguyen. Read the original post at: