Logo
Logo

CASB

Operating as a security checkpoint for cloud applications, CASBs monitor and control employee access to cloud services. Often deployed through proxy servers, CASBs manage Shadow IT risks, enforce acceptable use policies for sanctioned SaaS applications, and monitor activities within those applications. However, they do not extend to monitoring third-party activities like shared documents or email within the cloud environment.

Related Terms

Masked Data

Sensitive information replaced with lookalike arbitrary data, rendering it useless for malicious act...

link

Health Breach Notification Rule

This rule by the Federal Trade Commission requires vendors and service providers of personal health ...

link