Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Bitglass provides comprehensive data and security solutions for interactions occurring on any device, from any location. With an extensive global network comprising over 200 points of presence, Bitglass ensures exceptional performance and reliability, facilitating seamless business continuity for large enterprises. While transitioning to the cloud offers increased flexibility and reduced costs, it is crucial to maintain control over your data. The Bitglass Next-Gen Cloud Access Security Broker (CASB) solution empowers businesses to securely embrace both managed and unmanaged cloud applications. The innovative Bitglass Zero-day CASB Core is designed to adapt dynamically to the ever-changing landscape of enterprise cloud environments, offering real-time protection against data breaches and threats. Moreover, the Next-Gen CASB continuously learns and evolves in response to new cloud applications, emerging malware threats, changing user behaviors, and various devices, ensuring that robust security measures are in place for every application and device utilized by the organization. By leveraging these advanced capabilities, Bitglass enables businesses to confidently navigate their digital transformations while safeguarding their critical assets.

Description

Unlock the full capabilities of the cloud for your organization while maintaining control over your data. With a Cloud Access Security Broker (CASB) solution, you can securely manage both managed and unmanaged cloud applications. Forcepoint CASB integrates seamlessly with identity providers like Ping and Okta, allowing you to leverage existing segments you've created. If you don't yet have an identity provider, the CASB can function in that capacity, simplifying the process for your team to add applications and control access on an individual basis. The user-friendly interface ensures that employees can navigate it with ease. The risks associated with Shadow IT can lead to data being left unprotected, but you can swiftly identify both managed and unmanaged cloud applications in real-time using your web proxy and firewall logs. Additionally, the innovative Zero Trust Impossible Travel technology helps you detect compromised credentials more quickly by tracking the method, location, and time of access from individual devices. As data flows to and from the cloud, and even between different cloud services, it's crucial to safeguard it whether it's in transit or stored. You can block data during transit, encrypt or mask it, redact sensitive information, or apply watermarks for tracking purposes, ensuring that your vital information remains secure. Furthermore, taking proactive measures to protect your data not only enhances security but also establishes trust within your organization.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
Amazon Web Services (AWS)
Aurora Endpoint Security
Box
Confluence
CrowdStrike Falcon
Dropbox
Forcepoint ONE
Gmail
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Jira
Microsoft 365
OneTrust Privacy Automation
Proficio
Scuba Database Vulnerability Scanner
Slack
Workday HCM

Integrations

Active Directory
Amazon Web Services (AWS)
Aurora Endpoint Security
Box
Confluence
CrowdStrike Falcon
Dropbox
Forcepoint ONE
Gmail
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Jira
Microsoft 365
OneTrust Privacy Automation
Proficio
Scuba Database Vulnerability Scanner
Slack
Workday HCM

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Bitglass

Founded

2013

Country

United States

Website

www.bitglass.com

Vendor Details

Company Name

Forcepoint

Founded

1994

Country

United States

Website

www.forcepoint.com

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Alternatives

CloudSOC CASB Reviews

CloudSOC CASB

Broadcom

Alternatives

Check Point CloudGuard Reviews

Check Point CloudGuard

Check Point Software Technologies
Forcepoint CASB Reviews

Forcepoint CASB

Forcepoint
FortiCASB Reviews

FortiCASB

Fortinet