CASB (Cloud Access Security Broker) Overview

Sdílet
Vložit
  • čas přidán 12. 09. 2024

Komentáře • 16

  • @GirlGina26
    @GirlGina26 Před 2 lety +7

    Steve, I am floored that you don't have more subscribers. Your content is concise yet thorough and you present in a way that makes the topic accessible to a wide range of audience. This is exactly the type of content we have been looking for. Thank you for creating these videos.

    • @stevemurphy2347
      @stevemurphy2347  Před 2 lety +2

      Thanks Gina! Subscribers are growing - it takes time. Thanks very much for the compliment!

  • @libutm
    @libutm Před 2 lety +1

    Steve - This is useful info. Helped me in understanding CASB uses cases. Thanks.

  • @zedzpan
    @zedzpan Před rokem

    Thanks for explaining so simply. The message landed so clearly!

  • @omarcordovadelcastillo104

    Good and easy way to go over CASB, you should update it showing the difference between the reverse proxy and forward proxy deployment

  • @ppa5164
    @ppa5164 Před 10 měsíci

    Very nice, concise and sharp video, thanks!

  • @joshuaeuceda4635
    @joshuaeuceda4635 Před rokem

    Nice Job, and thank you for the content!

  • @Thereisnoplacelike
    @Thereisnoplacelike Před rokem

    The DLP functionality of CASB and any policy restrictions to the cloud app can be applied using a secure web gateway itself right? So what is the reason to have it separate for cloud applications?

    • @stevemurphy2347
      @stevemurphy2347  Před rokem +1

      Product overlap is what SASE is trying to solve. Your capabilities with specific point solutions will vary, but wrapping as many capabilities into a single SASE solution allows you to simplify.

  • @TerraGrowers
    @TerraGrowers Před rokem

    Steve, Do you think CASB is a replacement for MDM? Do CASB providers support mobile devices? Do CASB's enforce the same kind of policies, such as OS version, patching status, ..? Can CASB's wipe a device? Is CASB appropriate for BYOD?

    • @stevemurphy2347
      @stevemurphy2347  Před rokem

      Hello Terra, Thanks for your questions! I think can answer "No" to each of them. Monitors, alerts and controls data flows to various services. I don't consider it a protective service, but a preventative service. Best, Steve