CASB Use Cases (Cloud Access Security Broker)

Поделиться
HTML-код
  • Опубликовано: 26 ноя 2024

Комментарии • 36

  • @chachainboots2062
    @chachainboots2062 2 года назад

    Phewwww Thank you Steve
    I’m an entry level security engineer having hard time understanding of what CASB is🙄🙄 and finally found this on RUclips💛☺️

    • @steve_murphy1
      @steve_murphy1  2 года назад

      Glad to have helped. Thanks for the comment and compliment! Best, Steve

  • @kiliandietrich8526
    @kiliandietrich8526 Год назад

    Best video that I found on this topic... Well done! Thanks!

  • @dilanmanjulafernando6676
    @dilanmanjulafernando6676 8 месяцев назад

    Its a really valuble information. thanks for sharing. I'm doughtful that availability of a single product that can address all these scenarios.

  • @jeykasavan6985
    @jeykasavan6985 8 месяцев назад

    Very insightful &
    Clear & concise!

  • @eliasibrahim1055
    @eliasibrahim1055 Год назад

    Great content, pace and level of detail. Writing a CCSP soon and this is a life saver while doing my final reviews. Thank you ;)

  • @GirlGina26
    @GirlGina26 3 года назад +1

    As always, great content. Thank you, Steve.

  • @venherath6070
    @venherath6070 2 года назад

    Awesome! You probably explained it much better than any book out there. I had a hard time understanding this concept and you helped a lot! Thank you! Subscribed!

  • @adrianmassey6673
    @adrianmassey6673 Год назад

    Hi Steve, really interesting video. Just thinking about CASB and ZTNA, there seems abit of an overlap.
    I understood some of the CASB feature you mentioned, such as assessing the device posture, and ensuring a secure work environment were inherited features of a ZTNA solution. Is it common to have both ZTNA and CASB?
    Thanks

    • @steve_murphy1
      @steve_murphy1  Год назад

      Yes, It's very common to have both. There is some overlap, which is happening more and more across all security services, but CASB and ZTNA are two very different solutions. Best, Steve

  • @Thereisnoplacelike
    @Thereisnoplacelike 2 года назад

    Could you please share the details of Major players in CASB (which you think includes all or at least most of these use cases)

    • @steve_murphy1
      @steve_murphy1  2 года назад +1

      Thanks for your comment. If you look at the magic quadrant for CASB, most of the leaders will satisfy the use cases. I think the key to acquiring a CASB is selecting the right CASB partners for your situation and potentially a partner to manage the CASB for you. I'd be happy to assist further if you are looking for a CASB. Best, Steve

  • @Pikachu47
    @Pikachu47 Год назад

    How are unsanctioned apps identified by a CASB? Does Amazon and eBay count as an app or any site with a login page? We have a suspicion that departments are buying small apps without informing IT. Would the list of "apps" in use be in the tens of thousands, e.g. shopping sites etc. as it would then be impossible to work through even with a risk scoring system?

    • @steve_murphy1
      @steve_murphy1  Год назад

      Hello! Thank you for the question. The unsanctioned domains are discovered through basic traffic flows, not unlike your firewall, but the CASB can watch all traffic, even when the user is outside the firewall. Popular websites are generally categorized ahead of time.

  • @naveennoelj
    @naveennoelj 2 года назад

    Thank you Steve for your work. Nice talk on CASB. Qs: We have a requirement to secure and track source code in the company. Basically, how do companies secure their source code from active developers? E.g. Can an active developer in a company copy source code and reuse it when they leave? How can we track this? Is CASB the solution?

    • @steve_murphy1
      @steve_murphy1  2 года назад +1

      Thanks for your question, Naveen. Tracking source code that might be used elsewhere is not something I am familiar with. You should be able to monitor who is copying and posting information to another cloud resource with CASB. You can limit copying to a USB with an EPP. Lastly, you could isolate what the developers have access to with a zero trust solution. Hope that helps. Best, Steve

    • @naveennoelj
      @naveennoelj 2 года назад

      Thanks Steve, that surely helps...

  • @staffordeino5127
    @staffordeino5127 2 года назад

    We do not have any Cloud Applications as all our business data is stored on on-prem datacentre. However, I would like our remote users to access the on-prem data from anywhere on the internet. In this scenario, do I still need the services of CASB?

    • @steve_murphy1
      @steve_murphy1  2 года назад +1

      Hello, Not knowing but what you've put in your message, I'd say a CASB is not required. I'd focus on zero trust network access.
      Best, Steve

  • @MrJsysco
    @MrJsysco 2 года назад

    Does the CASB offerings from Cisco, PAN & Versa support all of these functions? Thanks

    • @steve_murphy1
      @steve_murphy1  2 года назад +1

      I would say "yes" to Cisco and PAN. Versa, probably, but that would take some additional investigation. Best, Steve

    • @MrJsysco
      @MrJsysco 2 года назад

      @@steve_murphy1 thanks!

  • @devendrasinghgautam7822
    @devendrasinghgautam7822 3 года назад

    Valuable information Steve

  • @devendrasinghgautam7822
    @devendrasinghgautam7822 3 года назад

    Does Zscaler provide all of the use cases

    • @steve_murphy1
      @steve_murphy1  3 года назад

      I'd say "yes," Zscaler supports the main use cases. You'd need to evaluate in detail with them. Best, Steve

  • @Lunnyfish
    @Lunnyfish 2 года назад

    very clear!

  • @wetic-worksmarter
    @wetic-worksmarter 3 года назад

    top