Gartner Market Guide for Cloud Access Security Brokers

"By 2020, 85% of large enterprises will use a cloud access security broker platform for their cloud services."* Gartner

In its most recent cloud security report, Gartner provides valuable guidance into the rapidly-growing CASB market. Read this complimentary report for insight into the market definition, direction, analysis, and recommendations, as well as an overview of representative vendors, including CloudLock.

Key Findings

  • Through 2020, 95% of cloud security failures will be the customer's fault.
  • The continued and growing significance of SaaS, combined with persistent concerns about security, privacy and compliance, continues to increase the urgency for control and visibility of cloud services.
  • The wide adoption of identity and access management into the cloud, delivering cloud single sign-on, has reduced the friction in adopting cloud services and related security controls like cloud access security brokers (CASBs).
  • By 2020, 85% of large enterprises will use a cloud access security broker platform for their cloud services, which is up from less than 5% today.
    *
  • Gartner

Gartner’s CASB Criteria

Gartner defines the market according to 4 main pillars.

 
Visibility

What apps – both authorized and unauthorized – are being used by your employees? How often and when are they using these apps? Such visibility grants organizations the much-desired insight into the Shadow IT side of
the equation.

 
Compliance

Cloud access security brokers offer an opportunity to understand if your organization is complying with regulations, such as HIPAA, PCI, FISMA, and so on, through data governance.

 
Data Security

Referring to not only encryption and tokenization, but also data loss prevention. What data is being accessed? What data is being shared? Is it being shared in a way that is harmful to the organization? Is my intellectual property being safeguarded?

 
Threat Protection

In order to effectively offer threat protection, CASBs look at internal users and malicious outsiders to evaluate the potential risk of behaviors. For instance, are users – trusted or otherwise – accessing information they should not have access to? User and entity behavior analytics (UEBA) is key here.

Gartner Market Guide for Cloud Access Security Brokers

Through 2020, 95% of cloud security failures will be the customer's fault.*

Complimentary Report
Complimentary 2016 Gartner Report

Moving Forward with CASB

According to Gartner, there are several considerations to take into account when implementing a CASB solution. Begin with the intention of contributing to the shift of applications and services to the cloud, while ensuring it is done securely. Avoid being the "no" team; instead, be the "yes we can and here's how" team.

Start by investigating what cloud services are being used to determine which ones must be sanctioned, remediated, controlled, or monitored. Apply controls to “known” cloud services, like Office 365 and Salesforce. When doing so, establish enterprise-wide data security governance policies that prioritize the protection of sensitive data and ensure the appropriate data security controls. Don’t forget about internally developed applications.

Integrate with existing security solution like IDaaS, IAM, web gateway and events going into central log management or SIEM. Lastly, look for CASBs that ease the compliance burden for cloud services.

Gartner
* Market Guide for Cloud Access Security Brokers 2016 Craig Lawson, Neil MacDonald, Brian Lowans, Brian Reed October 24, 2016 GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission.

Experience a Live Demo

See the CloudLock CASB & cloud cybersecurity solution in action from one of our cloud security experts

Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close