Cover Photo BYOD 2020

Bring Your Own Device: Bitglass’ 2020 Personal Device Report

The surge of unmanaged devices syncing corporate data in recent months has served as a catalyst for BYOD (bring your own device) adoption. The way business is conducted is changing on a ...
Business woman working on tablet with secured cloud technology and network concept

SmartEdge is a Key Enabler for a Modern Remote Workforce

To fully protect enterprise data, security teams have to balance two principle security threats: those coming from inside the organization, such as employees managing sensitive data, and those originating from malicious external ...
businessman hand working on laptop computer with digital layer business strategy and social media diagram on wooden desk-1

Enhancing speed and user experience with Bitglass SASE

In an environment where the surge in remote workers makes the discussion on security solution performance more pronounced, we’ve recently observed a wave of security teams approach us with a natural question: ...
Handsome person holding hologram screen displaying modern cloud based web system technology

Pushing Web Security to the Edge is Common Sense

Not many people would argue with Thomas Edison's quote, “The three great essentials to achieve anything worthwhile are, first, hard work; second, stick-to-itiveness; third, common sense.” If anything, it’s the last point ...
photo-1515378791036-0648a3ef77b2

Cost-Effective Cloud Security for the Modern Enterprise: Part 1

The acceleration of cloud adoption has been mirrored by the rise of bring your own device (BYOD). In recent months, these have both enabled the accelerated rise of the remote workforce. When ...
Closeup of hands of young man in checkered shirt using mobile phone while his partners arguing

The Importance of a Robust Reverse Proxy

The only constant in this world is change. That statement is no more true than within the technology space as hardware and software continue to change and evolve. Cloud service providers release ...
man-working-on-tablet_800

How to Thrive in a Remote-First Business World

Organizations are struggling to adapt their workforce to this highly remote, cloud-first environment that has become a necessity the world over. Enterprises rely highly on CASBs to secure their remote workforce, however, ...
240_F_206735965_f0yd3HmUAlEUbtWQBjO7EFBUZx6cow4K

The Need for Comprehensive DLP in The Remote Workforce

Cloud adoption has granted unprecedented data accessibility over the years. As data continues its migration to the cloud, industries the world over are experiencing a vast increase in organizational productivity and efficiency ...

On Authorization and Implementation of Access Control Models

There are dozens of implementations of authorization mechanisms. When there are complex requirements dictated by business processes, authorization mechanisms may often be implemented incorrectly or, at least, not optimally. The reason for ...

How to Prevent Insider Data Breaches at your Business

Guest article by Dan Baker of SecureTeamMajority of security systems are installed to try and forestall any external threats to a business’ network, but what about the security threats that are inside ...