Yahoo India Web Search

Search results

  1. A cloud access security broker, often abbreviated (CASB), is a security policy enforcement point positioned between enterprise users and cloud service providers.

  2. A cloud access security broker (CASB) is software or hardware that sits between users and their cloud service to enforce security policies as they access SaaS applications.

  3. A cloud access security broker, or CASB, offers security services to protect company cloud data from cyber attacks and data breaches. Learn about CASB security.

  4. What is a CASB (cloud access security broker)? A cloud access security broker (CASB) is a security check point between cloud network users and cloud-based applications. They manage and enforce all data security policies and practices, including authentication, authorization, alerts and encryption.

  5. A cloud access security broker (CASB) is an enforcement point that sits between cloud application users and cloud services to provide data protection and threat protection services.

  6. According to Gartner, a cloud access security broker (CASB) is an on-premises or cloud-based security policy enforcement point that is placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as cloud-based resources are accessed.

  7. A Cloud Access Security Broker (CASB) is an intermediary between cloud providers and cloud consumers that enforces an organization's security policies for cloud app access and usage.

  8. A Cloud Access Security Broker (CASB) implements zero-trust access control and policy enforcement for these cloud environments. Traffic to the cloud flows through the CASB solution, enabling it to enforce corporate security policies.

  9. Cloud Access Security Brokers (CASBs) are security policy enforcement points based in the cloud. CASBs are situated between cloud application users of an organization and cloud service providers (CSPs).

  10. A CASB performs inline and out-of-band inspection of outbound web traffic to block sensitive data from being publicly exposed or shared in the cloud with unwanted external audiences. Use it to align with your data security policies and to help meet regulatory compliance requirements.