Bitglass Secure Access Service Edge (SASE) Overview

With 2020 in the rear view mirror, we’re excited to start the New Year with new content and tons of exciting news. We’re kicking off 2021 with our new video which briefly ...

Glass Class: High-performance Security – The PolyScale Architecture

How do cloud security architectural design decisions affect vendors’ ability to provide a performant, scalable, and reliable platform? Take the example of an offsite meeting. Thousands of normally geographically dispersed employees converge ...

Bitglass for SASE

In today’s modern workforce, telecommuting, accessing corporate data via personal mobile devices, and cloud-first ecosystems have become the norm. As a result, organizations must rethink their security strategies. Context-based solutions that can ...

Glass Class: Finding Shadow IT

What can help you find what needs protecting in the crowded sea of apps going through your network? Shadow IT Discovery has the answer, with solutions that offer ease of use and ...
Closeup of young male theift in sweatshirt with hood transfering money from bills of stolen creding cards-2

The Rise of Insider Threats in Verizon’s DBIR

Each year, Verizon releases its Data Breach Investigation Report (DBIR). These reports evaluate the state of security each year, providing detailed statistics around leading vulnerabilities, which industries face the most breaches, and ...
Digitally generated medical interface in blue and black

A Perfect Intermediary: APIs

API? Application Programming Interface? More like A Perfect Intermediary for your data at rest. All jokes aside, using integrations with APIs to combat the potential risks from data at rest can broaden ...
Blue vivid image of globe. Globalization concept

Securing Data Beyond The Corporate Walls

Despite the massive international push for cloud adoption, a distressing number of corporations have not deployed the proper means to securing critical data. Traditional firewalls may have sufficed in the traditional on-prem ...
4P_Visibility

The Four Pillars of CASB: Visibility

Due to the potential for data leakage in the cloud, the use of CASBs (cloud access security brokers) is needed in order to maintain visibility over data that has gone beyond the ...