기사

Moving to the Cloud, Do I Still Need a CASB Solution?

As businesses move more of their workloads to the cloud, & with more sophisticated encryption & security measures, do they still need to have a Cloud Access Security Broker solution as well?

Anthony Cicero
Anthony Cicero
2021년 1월 12일 2 최소 읽기
Cloud security.
As organizations are increasingly moving to the cloud and doing “everything-as-a-service,” cloud computing is rapidly becoming the new normal in the information access and storage landscape. With the majority of enterprise workloads in the cloud by the end of 2020, education, healthcare and corporate America will be reaping the rewards of increased productivity and efficiency. Cloud technology is more robust and secure today, and while data security and privacy in the cloud are still major concerns to IT professionals, industry leaders are seeing that they cannot stop this moving train…they can either get on or get off. Most are choosing to get on the train. 
 
As IT operations began to move from on-premises installations to the cloud, organizations have looked for ways to bring security and access controls from internal data centers to cloud operations. One of the tools they found was the CASB (Cloud Access Security Broker). Now, a decade later from their introduction, CASBs are common parts of the enterprise security infrastructure. But for many individuals, knowing precisely what a CASB does, and why it's different from a next-gen firewall, is still something of a mystery.
 
The original purpose of a CASB was to provide visibility into all the cloud services in an enterprise infrastructure. In the war against "shadow IT" and its use of unapproved cloud services, the CASB was one of the first weapons. Deployed at the network edge and using a variety of proxy types, the CASB could identify every call to or connection from a cloud service, whether or not the cloud was approved.
 
According to Gartner, there are four areas of function of CASB:  Visibility, Compliance, Data Security and Threat Protection. These four areas are important in the shared responsibility cloud security model, in which the cloud provider is responsible for the protection of their infrastructure while the cloud customer is responsible for the security of their applications and data
 
So, you might think to yourself, with encryption in play and all of my data unreadable to unauthorized users, do we still need to have a CASB solution as well. The answer is “YES.”  CASB solutions provide IT Security teams with the ability to unify security measures across the cloud and provide visibility and control of what their users are doing. Proxy-based CASB solutions are a little “old school” but are still effective. They act as firewalls/gateways to verify user access to data in the cloud and can identify real-time threats. However, they can cause significant network delays and only secure known users. API-based CASB solutions are steadily replacing Proxy-based solutions. API-based solutions use the cloud’s native APIs to provide direct, secure access from any device without impacting network performance. They also provide visibility into user activity and threat protection, making compliance and security/privacy easier and more efficient. Whichever solution is chosen, CASB still needs to be there to provide organizations to ability to safely use cloud applications and create and store information in the cloud.
Tags

약 Anthony Cicero

As a member of the Center for Enterprise Security (CES) team, Anthony works closely with Teradata's strategic customers in the Americas to help them design the right security framework and strategy solutions to meet their security and privacy needs. This includes encryption, authentication, access control, etc. by building on the foundation of advocating, designing and delivering defense in depth, industry best-practices. As a Security/Privacy Architect, Anthony is responsible for articulating to customers all aspects of security and privacy to assist account teams with closing new and existing core opportunities by focusing on the customers’ business-enabled security, privacy and compliance requirements.

Anthony is a Certified Information Systems Security Professional (CISSP) and has been working exclusively within the security and privacy realm for 20 years. Previously, he ran the premier customer success organization for McAfee supporting North America which provided security consulting and support to the worlds largest companies including current Teradata customers.  

Anthony loves boating, golf, home improvement and cars (classics and fast sports cars).

모든 게시물 보기Anthony Cicero

알고 있어

테라데이트의 블로그를 구독하여 주간 통찰력을 얻을 수 있습니다



I consent that Teradata Corporation, as provider of this website, may occasionally send me Teradata Marketing Communications emails with information regarding products, data analytics, and event and webinar invitations. I understand that I may unsubscribe at any time by following the unsubscribe link at the bottom of any email I receive.

Your privacy is important. Your personal information will be collected, stored, and processed in accordance with the Teradata Global Privacy Policy.