<p>A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises <a href=”https://www.techtarget.com/searchdatacenter/definition/infrastructure”>infrastructure</a> and a <a href=”https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider”>cloud provider’s</a> infrastructure. A CASB tool provides a unified and consistent method of delivering cloud security for an organization to access cloud resources.</p>
<p>CASBs are designed to combine and enforce an organization’s <a href=”https://www.techtarget.com/searchsecurity/definition/security-policy”>security policies</a> when accessing cloud-based resources. They help prevent potential threats that can occur when an organization adds cloud-based networking to its IT infrastructure. CASBs are particularly important for maintaining data security, compliance and threat protection.</p>
<p>CASBs combine security policies, such as <a href=”https://www.techtarget.com/searchsecurity/definition/authentication”>authentication</a>, authorization, role-based access control, credential mapping, <a href=”https://www.techtarget.com/searchsecurity/definition/encryption”>encryption</a>, logging and <a href=”https://www.techtarget.com/searchsecurity/definition/malware”>malware</a> detection. A CASB tool sits between on-premises infrastructure and the cloud, ensuring that all traffic sent to the cloud complies with security policies before being sent, minimizing the security risk.</p>
<p>CASBs are available as on-premises and cloud-based software, as well as software as a service (<a href=”https://www.techtarget.com/searchcloudcomputing/definition/Software-as-a-Service”>SaaS</a>).</p>
<section class=”section main-article-chapter” data-menu-title=”How does a CASB work?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>How does a CASB work?</h2>
<p>CASBs ensure network traffic between on-premises devices and the cloud provider complies with an organization’s security policies, such as controlling access and identifying suspicious activity.</p>
<p>The value of cloud security brokers stem from their ability to deliver <a href=”https://www.techtarget.com/searchcloudcomputing/tip/Ways-to-use-AI-for-cloud-infrastructure-management”>insight into cl
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: