by Brian McCarthy | Mar 12, 2019 | CASB, Case Studies, Cloud, Data Protection, Premium content, Security
Learn the top ways enterprises use a CASB to enforce necessary security controls across their data in Office 365 applications. As more enterprises adopt Microsoft Office 365, new questions are arising about the security and compliance of corporate data. In moving to...by Brian McCarthy | Mar 10, 2019 | Cloud, Data Protection, eBook, FW-as-a-Service, Premium content, Security, Transformation
More powerful than NGFW without the cost and complexity Many organizations are turning to local internet breakouts and SD-WAN to give users fast and secure access to cloud applications. But, how can a cloud-first organization deliver enterprise firewall...by Brian McCarthy | Mar 5, 2019 | Blog, Data Protection
Disaster Recovery planning is a sensible practice, but the price of it can be intimidating. Some companies opt to have no disaster recovery plan at all for that reason, but this choice can end up costing a lot. If you aren’t ready, the loss after a disaster can take a...by Brian McCarthy | Mar 4, 2019 | Cybersecurity, Data Breach, Data Protection, Firewall, Premium content
Firewalls infrastructure: Single vendor or multi-vendor? Cisco defines a traditional firewall as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security...by Brian McCarthy | Feb 21, 2019 | Blog, Cloud, Data Protection, SWG
What is a secure web gateway? So what exactly is a secure web gateway? A secure web gateway is an advanced, cloud-delivered or on-premises network security service. It enforces consistent internet security and compliance policies for all users regardless of their...by Brian McCarthy | Feb 20, 2019 | CASB, Cloud, Data Breach, Data Classification, Data Protection, Security
The 10 Providers That Matter Most And How They Stack Up Forrester, a leading independent research firm in the field of cybersecurity, recently published its second Wave report on cloud security gateways (CSG). Also referred to as cloud access security brokers...