Cloud Access Security Brokers, known as CASBs, are a new window into everyday security and safety needs of companies that increasingly serve cloud-focused applications and services that can kept much more secure with the help of CASB platforms.
Gartner Inc., has recently announced a few technological advances for information security and defines Cloud access security brokers (CASBs) as on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. CASBs consolidate multiple types of security policy enforcement. Example security policies include authentication, single sign-on, authorization, credential mapping, device profiling, encryption, tokenization, logging, alerting, malware detection/prevention and so on.
Organizations risk fragmented, complex and noncompliant use of cloud-based resources. Many solution providers are appearing offering cloud access security broker capabilities consolidating a variety of disparate approaches. Gartner outlines the capabilities you should look for when selecting a CASB.
1) Cloud Access Security Brokers – cloud-based points, which are used for security policy enforcement purposes, and are placed between cloud service providers and cloud service consumers.
2) Adaptive Access Control – a type of control with context awareness access.
3) Pervasive Sandboxing (Content Detonation) and IOC Confirmation – a great option to detect intrusions as soon as possible, and to reduce hackers’ chances to cause damage to sensitive information.
4) Endpoint Detection and Response Solutions – used to record numerous network events and endpoints, and store the information in a centralized database.