Businessman working with a Cloud Computing diagram on the new computer interface

Why Forego Health: WFH Securely through the Cloud

Companies across all verticals are facing the unfortunate reality of the current situation. Cautionary measures to flatten the curve have prompted a rapidly growing number of employees to join the Work From Home (WFH) culture. Although fortunate enough to be able to WFH, the security of organizations is now at ... Read More

Glass Class: Finding Shadow IT

What can help you find what needs protecting in the crowded sea of apps going through your network? Shadow IT Discovery has the answer, with solutions that offer ease of use and visibility into the vulnerabilities present throughout your organization. Identifying apps is the first, but at times most time ... Read More
Giant padlock next to a circuit board with blue sky on the background

Partners in Cloud: Bitglass | Zscaler

As companies expand, the adoption of cloud services grows in parallel. Bitglass’ Cloud Adoption Report recently released in 2019, found that 86% of enterprises have deployed cloud-based tools. These cloud services come with a plethora of benefits, including scalability, agility, and cost savings. However, with the good comes bad - ... Read More
RE3wtYV

What a Night at Ignite

After becoming a Product Manager at Bitglass, I eagerly waited to attend my first conference. Following my experience at Microsoft Ignite, I can confirm that my fervor was well warranted. The conference consisted of entertaining booth duty shifts, newly formed relationships with astute individuals coming from a range of industries, ... Read More
Digitally generated medical interface in blue and black

A Perfect Intermediary: APIs

API? Application Programming Interface? More like A Perfect Intermediary for your data at rest. All jokes aside, using integrations with APIs to combat the potential risks from data at rest can broaden the security scope your organization has ... Read More
Abstract blue text background

Appeasing the Oasis of Unknown: Shadow IT Discovery

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive logs can be overwhelming. Shadow IT discovery offers the ability to narrow down the search to apps that ... Read More
Digital security lock

Cloud Security Posture Management: Why You Need It Now

Gartner recommends that security and risk management leaders invest in CSPM (cloud security posture management) processes and tools to avoid misconfigurations that can lead to data leakage. Although it is a relatively new class of tools, this recommendation comes with reason; CSPM allows for just what its name implies: the ... Read More