Comparing CASB Technologies for Cloud Security: What’s the Difference?

Jonathan Andresen, Senior Director Marketing, Bitglass

Add bookmark

Cyber Security Hub APAC Summit Session Highlight

Comparing CASB Technologies for Cloud Security: What’s the Difference?
Jonathan Andresen, Senior Director Marketing, Bitglass
 
Enterprises are embracing cloud computing but few have fully considered the risks associated with device-to-cloud transformation from security breaches to data loss issues. Cloud access security brokers (CASBs) are often described as the firewall for the cloud and are the go-to solution to secure cloud services for many organizations. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks. Yet not all CASBs are created equal, and it can be a challenge to identify which solution to deploy. From capabilities to the security of underlying architectures, there is much to consider.
 
In this exclusive session we will cover:
  • The major differences between CASB architectures
  • CASB deployment modes and how they provide different data protection
  • Key items you need to consider to secure any app or device
  • Practical use cloud security use cases that can apply to your organization

View each CSHub APAC session on-demand now.


Sponsored By:

Upcoming Events

Automotive Cyber Security, Connectivity & SDV Week 2025

18th - 20th November, 2025

Van der Valk Hotel Berlin Brandenburg, Germany

Automotive Cyber Security, Connectivity & SDV Week 2025

Digital Identity Week

1st - 2nd September 2026

Sydney, Australia

Digital Identity Week

Latest Webinars

From Dependencies to Defences: Navigating Software Supply Chain Security

2025-09-24

11:00 AM - 12:00 PM SGT

Learn how to defend your software supply chain from dependency threats and build resilient security...

Unpacking global regulatory frameworks to enhance third-party operational resilience

2024-11-14

11:00 AM - 12:00 PM EST

Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu...

Preventing financial and reputational risk with process intelligence

2024-05-23

11:00 AM - 12:00 PM EDT

Learn how to manage risk stemming from poorly controlled processes in a collaborative way

Recommended