Cloud Security University

We're enhancing our Cloud Security University! Please take this short survey to
let us know what topics you'd like to see here!

Take Survey

The mass exodus to the cloud creates a monumental opportunity for security leaders to transform security from a necessary protection to a business enabler, opening up new possibilities for employees. The Cloud Security University arms modern security professionals with the information necessary to begin this journey.

What Is Shadow IT?

What Is Shadow IT?

The security marketplace is buzzing about shadow IT — a phenomenon in which users enable public cloud applications without the consent or knowledge of the IT department.

Read more
A Quick Guide to Cloud Security Solutions

A Quick Guide to Cloud Security Solutions

As you consider the sometimes overwhelming options for cloud security solutions, there is a lot to think about.

Read more
Google Drive Security

Google Drive Security

Who’s Responsible for Securing Your Files Anyway?
There’s no denying it: the business benefits of Google Drive are incredible.

Read more
Cloud Security and Compliance

Cloud Security and Compliance

As organizations extend their data repositories from on premises platforms into SaaS applications like Google Apps, Salesforce, Dropbox, and others, data governance and compliance regulations follow.

Read more
Cloud Encryption

Cloud Encryption

The cloud, and particularly the adoption of public cloud applications such as Salesforce, Google Apps, Dropbox, and others, impacts one of the primary instruments in every organization’s security toolkit: encryption.

Read more
What Is Cloud Data Protection?

What Is Cloud Data Protection?

While many of the traditional principles of data protection transfer to the cloud ecosystem, the hyper-interconnected nature of SaaS applications introduce new considerations.

Read more
Cloud Access Security Brokers Defined

Cloud Access Security Brokers Defined

Cloud access security brokers (CASB), as defined by Gartner, are cloud-based security policy enforcement points...

Read more
Google Drive Encryption

Google Drive Encryption

Despite an organization’s best efforts, the possibility of data externalization persists.

Read more

Experience a Live Demo

See the CloudLock CASB & cloud cybersecurity solution in action from one of our cloud security experts

Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close