Cloud Access Security Broker consolidate multiple types of security policy enforcement. Example security policies include authentication, single Sign-On, authorization (Access Control), Credential Mapping, device profiling, encryption, tokenization, logging, alerting, malware detection/prevention and so on.
How Cloud Access Security Broker Work#Cloud Access Security Brokers may run in a corporate data center or in a hybrid mode that involves the data center and the cloud, but the majority of companies choose a Cloud Access Security Broker that operates exclusively from the cloud – unless regulatory or data sovereignty considerations require an on-premises solution.
Cloud Access Security Broker Providers#
- Forcepoint CASB
- Skyhigh Networks
- Cisco Cloudlock
- Microsoft Cloud App Security
- Bitglass Cloud Security
- Netskope Active Platform