AST Jan 2020 Magazine AST Jan 2020 Magazine | Page 27

www.AmericanSecurityToday.com Jan/Feb 2019 - Edition 40 Unfortunately, this is often easi- unsanctioned applications er said than done. while scrambling to figure out whether or not they have any Employees are used to being vulnerabilities and how to sup- able to simply pull out their port them. them . credit cards and download ap- plications to their mobile devic- Neither of these scenarios is es and PCs for the sake of expe- ideal. diency. The former creates friction be- Sometimes, IT is the last to tween IT and the employee know when new applications base base, , while the other puts un- are accessed—if accessed —if they know at all. due pressure on IT managers who are already strapped for Given this difficult situation, time and resources. managers are faced with two un- savory options. options . Cloud Access Security Brokers They could choose to stop the use of any non-sanctioned cloud application, , but that could cause application rancor amongst employees who are only trying to do their jobs more efficiently, not intention- ally open up security holes. holes . Offer a Viable Third Option Cloud Access Security Brokers ( CASBs CASBs) ) provide a viable alter- native. . native CASBs operate between the end user and the hosted service pro- vider, ensuring that any data Or, they could allow use of the that passes between the two 27