Finding Shadow IT

Glass Class: Finding Shadow IT

What can help you find what needs protecting in the crowded sea of apps going through your network? Shadow IT Discovery has the answer, with solutions that offer ease of use and visibility into the vulnerabilities present throughout your organization. Identifying apps is the first, but at times most time ... Read More
Partners in Cloud: Bitglass | Zscaler

Partners in Cloud: Bitglass | Zscaler

As companies expand, the adoption of cloud services grows in parallel. Bitglass’ Cloud Adoption Report recently released in 2019, found that 86% of enterprises have deployed cloud-based tools. These cloud services come with a plethora of benefits, including scalability, agility, and cost savings. However, with the good comes bad - ... Read More
What a Night at Ignite

What a Night at Ignite

After becoming a Product Manager at Bitglass, I eagerly waited to attend my first conference. Following my experience at Microsoft Ignite, I can confirm that my fervor was well warranted. The conference consisted of entertaining booth duty shifts, newly formed relationships with astute individuals coming from a range of industries, ... Read More
A Perfect Intermediary: APIs

A Perfect Intermediary: APIs

API? Application Programming Interface? More like A Perfect Intermediary for your data at rest. All jokes aside, using integrations with APIs to combat the potential risks from data at rest can broaden the security scope your organization has ... Read More
Appeasing the Oasis of Unknown: Shadow IT Discovery

Appeasing the Oasis of Unknown: Shadow IT Discovery

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive logs can be overwhelming. Shadow IT discovery offers the ability to narrow down the search to apps that ... Read More
Cloud Security Posture Management: Why You Need It Now

Cloud Security Posture Management: Why You Need It Now

Gartner recommends that security and risk management leaders invest in CSPM (cloud security posture management) processes and tools to avoid misconfigurations that can lead to data leakage. Although it is a relatively new class of tools, this recommendation comes with reason; CSPM allows for just what its name implies: the ... Read More