AST Jan 2020 Magazine AST Jan 2020 Magazine | Page 27
www.AmericanSecurityToday.com
Jan/Feb 2019 - Edition 40
Unfortunately, this is often easi- unsanctioned
applications
er said than done.
while scrambling to figure out
whether or not they have any
Employees are used to being vulnerabilities and how to sup-
able to simply pull out their port them.
them .
credit cards and download ap-
plications to their mobile devic- Neither of these scenarios is
es and PCs for the sake of expe- ideal.
diency.
The former creates friction be-
Sometimes, IT is the last to tween IT and the employee
know when new applications base
base, , while the other puts un-
are accessed—if
accessed —if they know at all. due pressure on IT managers
who are already strapped for
Given this difficult situation, time and resources.
managers are faced with two un-
savory options.
options .
Cloud Access Security Brokers
They could choose to stop the use
of any non-sanctioned cloud
application, , but that could cause
application
rancor amongst employees who
are only trying to do their jobs
more efficiently, not intention-
ally open up security holes.
holes .
Offer a Viable Third Option
Cloud Access Security Brokers
( CASBs
CASBs) ) provide a viable alter-
native. .
native
CASBs operate between the end
user and the hosted service pro-
vider, ensuring that any data
Or, they could allow use of the that passes between the two
27