What is a Cloud Access Security Broker (CASB)?
A CASB provides enterprises with a critical control point for the secure use of
cloud services across multiple cloud providers software as a service (SaaS) apps
are becoming pervasive in enterprises, A CASB can consolidate multiple types
of security policy enforcement security policies enforced by a CASB include
authentication, single sign-on, authorization, credential mapping, device
profiling, encryption, tokenization, logging, alerting, and malware detection
A CASB has multiple use cases for the enterprise:
Secure shadow IT
Continuous security compliance of critical resources in OCI
Automated anomalous behavior detection with smart policies
Governance of privileged activities
Vulnerability detection by monitoring configuration drifts
Proactive remediation and unified incident management
BEHAVIOR ANALYTICS & THREAT PROTECTION
Detect anomalous behavior of users that may result in insider threat
Compromised accounts that may result in malicious resource usage
Oracle CASB provides a robust built in incident management functionality. This ensures that any alert that is generated by CASB is tracked and appropriate action taken. Additional integrations with incident management solutions such as Service Now are also provided.
Oracle CASB helps detect misconfiguration of various OCI components such as:
Compute Images and Compute Instances
Networking and Load Balancers
Identity Users and Groups
Database Systems and Object Storage
Further, with Smart Policies, customers benefit from the abundance of security
expertise built by experts. These policies are automatically turned off for each
customer to ensure predictable and consistent security across all OCI
A Tour of the Oracle CASB Cloud Service Console:
Get familiar with the major screens and the functions they provide in the
Oracle CASB Cloud Service console.
- Incident Management Provider
- Administrator Management
- Threat Intelligence Provider
- SIEM Provider
- Risk events
- Threat Management
- Manage IP Addresses
- Policy Management
How CASBs work:
There are two key ways that a CASB can work. It can be set up as a proxy -
either a forward or a reverse proxy - or it can work in API mode using cloud
providers' APIs to control cloud access and apply corporate security policies.
Increasingly CASBs are becoming "mixed mode" or "multi-mode," using both
proxy and API technology. Both of the approaches have its own pros and cons.
About Vast Edge - Simplified Cloud Solutions
Founded in the year 2004, Vast Edge is a leading IT Consulting Company and Global Service provider of Business Intelligence, big data analytics, cloud ERP, IoT platform, enterprise backup, and disaster recovery, Blockchain, Cassandra, AI/ML, and Integration solutions. We perform Application modernization, follow continuous change management, and implement advanced practices while working on the key areas of enhancing methodologies of project development.
Get a Free Assessment from our cloud experts.
Hello! 👋 How can we help you today?