The differences between an API vs Proxy CASB are important to understand for your organization’s cloud security To understand why there are differences in an API vs. Proxy CASB, we must first look at where the term cloud access security broker, or CASB, came from. It was coined by Gartner when the first proxy-based CASBs […]
Data loss prevention in Office 365 protects your sensitive information from rogues and nerf herders If the Empire had been a bit more careful with their intellectual property information, they may have been able to take control of the galaxy much faster. Instead, absence of effective data loss prevention resulted in the destruction of the […]
What is data loss prevention and why does your company need it? In many ways, data is the true global currency of our time. Companies and other organizations are now able to collect, analyze, and monetize an unfathomable amount of data. Unfortunately, criminals also have the ability to steal, use, and sell data for profit. […]
Cyber safety is important, but it isn’t a replacement for cybersecurity I recently attended the TCEA SysAdmin conference in Texas and was intrigued by the workshop: Cyber Safety and Security. Miguel Guhlin presented important ideas regarding the differences in cyber safety and security that are often missed by K12 district administrations. In truth, my team […]
Companies are shifting to Cloud Application Security Platforms (CASP) to improve speed without sacrificing security I am fascinated with terms industry analysts introduce to the market. Oftentimes, these terms confuse the market more than they help. The risk is that these terms become outdated even before an analyst publishes their paper. It then takes an […]
Layering your K-12 campus safety management and cybersecurity tools provides the most complete coverage School administrators have a heavy burden when it comes to keeping students and faculty safe in today’s education environments. Threats to health and safety come in many forms, including cyber threats as well as physical ones. We mainly deal with K-12 […]
As more colleges and universities transition to the cloud, higher education cloud security can no longer be treated as an elective As they say, “the writing is on the wall” for the eventual transition to cloud computing in higher education. Like many organizations, colleges and universities are moving to the cloud to reduce the costs […]
Learn why schools across the country are using dedicated K-12 cloud application security technology to protect students and staff
Learn How School IT Administrators Protect Students and Staff with K-12 Cloud Security
K-12 cloud security solutions protect students and staff from identity theft, financial risk and personal harm
Remember the excitement of heading back to school? Spending hours organizing your pencil box and binder until you got it just right? Fresh notebooks ready to be filled with notes and doodles? For today’s student, the same excitement is there (most of the time hopefully), but the tools have changed.
As cloud apps and CASBs have matured, predicting 2018 industry events is much easier than in the past. You don’t need to be a psychic to know that there will be at least one CASB vendor acquired by a big security company. Of course, there will be nuances and details that are hard to pin down, but for the most part, the road ahead is getting clearer. Acquisitions, product changes, and our day to day work provide hints at what’s coming next.
As we roll into 2018, we expect 2017 will be remembered with mixed emotions. Instead of debating its merits and drawbacks, most will agree that 2017 was a time of rapid change, especially for cloud security technology. Stories about digital security are mainstream news. And we are proud to say that the Cloud Access Security Broker (CASB) industry has also become mainstream, to the point that consolidations have shrunk the standalone space, and CASBs play an important role in most major security stacks.
Higher education institutions are major targets for hackers. Their databases contain a perfect trifecta of personal information, financial and health data for what’s considered high-value targets on the black market. Last year, a hacker known as Rasputin breached over 60 universities and government agencies and the tally continued to grow into 2017, becoming one of the largest higher education breaches in history.
Lately, it’s become popular to say that CASB tools use Machine Learning (ML) to detect anomalies in cloud apps. However, you have to be cautious about these claims. What is not widely known is that building a machine learning model is the easy part; training the model is the hard part, requiring enormous amounts of data.
In the past, security technologies were black boxes that you placed in your data center. For the most part, customers didn’t look inside the security technology. Those black boxes worked well in a defined perimeter. Things started changing with virtualization. You can now get a powerful security VM stood up in minutes.
Email is almost too easy. We barely give it a second thought before hitting send or clicking open. According to a 2014 study published by the Radicati Group, people check their email an average of 74 times a day to receive about 88 emails and send about 34 emails, and that was 3 years ago! If we spent a lot of time thinking about every single email we receive and send, we’d spend our entire workday in our inboxes.
We’re excited to announce that UK companies can now have visibility and control of their cloud applications thanks to our first reseller partners in the UK: Prevention Software and Cyber Secure. These partners are now offering our CASB product, Cloud Access Monitor.
Schools need accessible data and networks for a diverse audience of users, including students, parents, teachers, administrators, and third-party vendors. And on the surface, it seems that the cloud is making meeting everyone’s needs much easier. Yet the transition to cloud-based computing was oversold as a much less expensive way to manage IT, but the truth is that you still have to manage your school’s IT services and cybersecurity even when they are in the cloud. It’s a delicate balancing act.
I used Google Docs to write this post – the popular word processing app within Google G Suite. At ManagedMethods, Docs is an indispensable part of our workflow. Collaborating, sharing and editing documents with a team through the cloud is easier than ever, leaving many of Microsoft’s Office apps in the dust.