Glass Class: Finding Shadow IT

What can help you find what needs protecting in the crowded sea of apps going through your network? Shadow IT Discovery has the answer, with solutions that offer ease of use and ...
Businessman working with a Cloud Computing diagram on the new computer interface

Improved Team Collaboration with G Suite, Powered by Bitglass & Okta

As organizations continue to select their productivity suite, G Suite has rapidly established itself as a platform that seamlessly empowers team collaboration. A state agency recently started adopting G Suite and their ...
Giant padlock next to a circuit board with blue sky on the background

Partners in Cloud: Bitglass | Zscaler

As companies expand, the adoption of cloud services grows in parallel. Bitglass’ Cloud Adoption Report recently released in 2019, found that 86% of enterprises have deployed cloud-based tools. These cloud services come ...

Glass Class: Where to Detect Malware

Many organizations fall to data breaches caused by malware. Malware can and will infect sensitive data uploaded to the cloud unless specific security measures are taken to prevent the spread of malware ...

Glass Class: How to Detect Malware

Malware can be a serious threat to organizations that don't have the proper security tools to protect against it. Some forms of malware can force enterprises to pay sums of dollars, freeze ...

Glass Class: The ZScaler and Bitglass Integration

With the various tools used in today’s cloud-first world, it could be confusing for organizations to find the correct tools they need to protect sensitive data. In light of this, Bitglass and ...

Glass Class: Protecting Unmanaged Device Access to Cloud Apps

With the rapid adoption of bring your own device (BYOD), companies are in need of a security solution that can secure any device outside of the corporate firewall. Some companies have turned ...
Picture2-2

Bitglass at AWS re:inforce 2019: Next-Gen CASBs

After returning from a trip to Boston for AWS re:inforce, I thought it would be good to share some of the key takeaways from the event. First off, I’d like to thank ...
Hand holding smartphone with media icons and symbol collection

Unsanctioned Apps in the Enterprise

Today, organizations leverage a plethora of software applications to enhance productivity, increase collaboration, and evolve their businesses. Some of these applications are IT approved and are purchased with a license by the ...
Loading...

Secure Guardrails