Access control
Advice: Protecting Lone Workers Through Covid Restrictions
Protecting lone workers is an issue that businesses may not have come across previously, especially those based in busy city centre office blocks pre-coronavirus. Yet with many thriving business districts deserted through ...
The Role of Access Control in Information Security
Access control systems are everywhere and play a key role in identity and access management (IAM)— let’s break down the different types of access control models & how they work... The post ...
Bitglass’ 2020 Cloud Security Report
This year, the fabric of our society has forgone unimaginable changes due to the global pandemic, and it’s likely that the impact will persist long after it is gone. The inevitable push ...
Accelerating Security and the Cloud With Bitglass and AWS Global Accelerator
Businesses’ IT infrastructures have undergone critical changes in the way that they store data and extend access to resources for users. Cloud, BYOD, and remote work have changed things forever. Where the ...
Enhancing Visibility with Bitglass and Splunk
The complexity of organizations’ IT infrastructures is always increasing. Modern businesses are faced with cloud-based resources like software-as-a-service apps and infrastructure-as-a-service platforms, as well as personal devices, a diffuse remote workforce, IoT, ...
Thwarting Malware Attacks with Bitglass
As more and more data is stored in the cloud and companies enable BYOD and remote work, comprehensive threat protection against known and zero-day malware becomes a critical need. Unfortunately, even some ...
The Bitglass SASE Triangle: ZTNA for Internal Applications
Remote work, the remote workforce, working from home--all common phrases due to the series of unprecedented changes that have occured over the last several months. Organizations have had to adjust in order ...
The Bitglass SASE Triangle: SWG for Securing Web Traffic
In today’s modern workforce, the enterprise attack surface is larger than ever before; with cloud apps, personal devices, on-premises resources, web destinations, and more. As a result, organizations are in need of ...
Deception in the Workforce: Bitglass’ 2020 Insider Threat Report
When it comes to imagining threats to enterprise cybersecurity, it is easier to conjure up ideas of malicious third parties that are plotting to infiltrate an organization. However, a considerable amount of ...
Cost-Effective Cloud Security for the Modern Enterprise: Part 3
In order to adapt and thrive in the remote workforce, organizations need cost-effective security solutions that protect data, block threats, and enable business operations without diminishing financial resources. As such, Bitglass has ...

