/Shannon Smith

About Shannon Smith

This author has not yet filled in any details.
So far Shannon Smith has created 65 blog entries.

Eight Security Capabilities You Need to Protect Your Amazon Web Services Infrastructure

The worldwide infrastructure as a service (IaaS) public cloud market grew 31 percent in 2016 to total $22.1 billion, up from $16.8 billion in 2015, and is expected to show the fastest growth over the next five years compared to platform as a service (PaaS) and software as a service (SaaS), according to Gartner. With increasing adoption of IaaS platforms, we also see [...]

January 29th, 2018|Uncategorized|0 Comments

What is a CASB (Cloud Access Security Broker)?

Cloud access security brokers (CASB) are on-premises or cloud-hosted software that sit between cloud service consumers and cloud service providers to enforce security, compliance, and governance policies for cloud applications. CASBs help organizations extend the security controls of their on-premises infrastructure to the cloud. What Is a CASB? from Skyhigh Networks on Vimeo. While some CASB [...]

January 7th, 2018|Uncategorized|0 Comments

Tokenization vs Encryption

Tokenization and encryption are often mentioned together as means to secure information when it’s being transmitted on the Internet or stored at rest. In addition to helping to meet your organization’s own data security policies, they can both help satisfy regulatory requirements such as those under PCI DSS, HIPAA-HITECH, GLBA, ITAR, and the EU GDPR. While tokenization and encryption are [...]

January 7th, 2018|Uncategorized|0 Comments

Cloud Computing Trends 2017

The transformative impact of cloud adoption Back in 2011, entrepreneur and investor Marc Andreessen wrote about how software impacts nearly all areas of modern life. The principal platform for software applications today is not a hard drive; it’s a web browser. Software delivered over the Internet, referred to as the cloud, is not just changing [...]

December 20th, 2017|Uncategorized|0 Comments

Is the Cloud Secure?

The rapid growth of cloud services is an indication that companies are anxious to quickly deploy new cloud-based applications that can make their workers more collaborative, mobile, and productive. However, as sensitive corporate data moves beyond the firewall, IT organizations are understandably unsure about their ability to continue enforcing the security and compliance policies they utilize for data stored [...]

November 26th, 2017|Uncategorized|0 Comments

Gartner’s 10 Best Practices for Successful CASB Projects

The cloud access security broker (CASB) market has been around for 5 years. Since its inception, the market has gone through major changes. Most CASB vendors started by providing visibility and control over shadow IT cloud services that individual employees procure on their own without the approval or even knowledge of the IT department. Next, CASB vendors [...]

November 19th, 2017|Uncategorized|0 Comments

Three Breakthrough Innovations for Today’s Cloud Security Challenges

This blog was originally published on the Skyhigh Networks website. Resultex is a Skyhigh Networks partner. For more information contact us. When we founded Skyhigh five years ago, we recognized that security was the biggest barrier to cloud adoption. But we also saw the promise of cloud to transform how organizations conduct business. We wanted [...]

October 30th, 2017|Uncategorized|0 Comments

Five Years of CASB and the Road Ahead

Cloud has become the computing mode of choice for business employees and IT professionals alike. Whether it’s SaaS applications that improve productivity, or IaaS platforms used to deploy custom applications, companies in every vertical are going all in on cloud. The cloud computing industry has reached multiple milestones in the past year. 2017 is the [...]

October 23rd, 2017|Uncategorized|0 Comments

What is a Cloud Security Gateway (CSG)?

Cloud security gateways (CSGs), also known as cloud access security brokers (CASB), are on-premises or cloud-hosted security software that act as a policy enforcement point between an enterprise and cloud applications that employees use. CSGs provide IT security teams visibility into cloud service usage and cloud-centric security capabilities that mirror the controls enterprises deployed to protect [...]

September 20th, 2017|Uncategorized|0 Comments