What is a cloud access security broker (CASB)?

<p>A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises <a href=”https://www.techtarget.com/searchdatacenter/definition/infrastructure”>infrastructure</a> and a <a href=”https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider”>cloud provider’s</a> infrastructure. A CASB tool provides a unified and consistent method of delivering cloud security for an organization to access cloud resources.</p>
<p>CASBs are designed to combine and enforce an organization’s <a href=”https://www.techtarget.com/searchsecurity/definition/security-policy”>security policies</a> when accessing cloud-based resources. They help prevent potential threats that can occur when an organization adds cloud-based networking to its IT infrastructure. CASBs are particularly important for maintaining data security, compliance and threat protection.</p>
<p>CASBs combine security policies, such as <a href=”https://www.techtarget.com/searchsecurity/definition/authentication”>authentication</a>, authorization, role-based access control, credential mapping, <a href=”https://www.techtarget.com/searchsecurity/definition/encryption”>encryption</a>, logging and <a href=”https://www.techtarget.com/searchsecurity/definition/malware”>malware</a> detection. A CASB tool sits between on-premises infrastructure and the cloud, ensuring that all traffic sent to the cloud complies with security policies before being sent, minimizing the security risk.</p>
<p>CASBs are available as on-premises and cloud-based software, as well as software as a service (<a href=”https://www.techtarget.com/searchcloudcomputing/definition/Software-as-a-Service”>SaaS</a>).</p>
<section class=”section main-article-chapter” data-menu-title=”How does a CASB work?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>How does a CASB work?</h2>
<p>CASBs ensure network traffic between on-premises devices and the cloud provider complies with an organization’s security policies, such as controlling access and identifying suspicious activity.</p>
<p>The value of cloud security brokers stem from their ability to deliver <a href=”https://www.techtarget.com/searchcloudcomputing/tip/Ways-to-use-AI-for-cloud-infrastructure-management”>insight into cl

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: