Avatar of Mattia Minervini
Mattia MinerviniFlag for Italy

asked on 

Understanding technologies and method of Cloud Access Security Broker.

Hi Experts, i would understand better what CASB and how they realize more secure solution to connect someone to cloud resources.
I need a brief about network topology, encryption method (like ciphercloud) , appliance can perform storage redundancy and secure connection..
I'll accept only answer that provide a complete coverage and useful links/documents
Sorry for my english, ask me for details
really thanks

M
Cloud ServicesNetworkingSecurity

Avatar of undefined
Last Comment
Tejas Ambekar
ASKER CERTIFIED SOLUTION
Avatar of Adam Brown
Adam Brown
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of Mattia Minervini

ASKER

Thanks for your answer. my goal is desing ( in a primitive way) a CASB service, in order to select a real CASB provider useful for two customers.
I understand CASB are a complex sum of tech, method, best practices, tool aggregated to realize a secure layer beetween me and cloud different resources.
Link you provided is really good.  Can we look for two CASB provider with a short explanation of their specific service? ( i don't know.... CASB1 that works as a proxy model and make encryption, provide geographic redundancy beetween different location..)
Avatar of Mattia Minervini

ASKER

enough info
Avatar of Tejas Ambekar
Tejas Ambekar

https://www.cloudcodes.com/about-us/ this provides you a good explanation about the CASB provider.

CloudCodes provides cloud solutions allowing the enterprise to the open doors for business value- regardless of the location. We offer top notch CASB solutions that enable enterprises to adopt cloud for better collaboration and leave all their cloud data security worries to us.
Networking
Networking

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.

102K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo