Gartner Research

Securing SaaS Using Cloud Access Security Brokers

Published: 18 June 2015

ID: G00277191

Analyst(s): Ramon Krikken

Summary

Using CASBs, clients can add a range of security capabilities — from discovery to activity control and data encryption — to a multi-SaaS environment. Picking which capabilities to deploy first is critical to success.

Table Of Contents

Analysis

  • The Reality of Security in SaaS Environments
  • Four Architectural Approaches to CASB Integration
  • Examining the Security Capabilities of CASB and SPSM Solutions
  • Using CASBs for Data Encryption and Tokenization
    • Reducing Functionality Loss in CASB-Encrypted SaaS
    • Improving Operational Resilience in CASB-Encrypted SaaS
  • Selecting a CASB, CDPG or SPSM Solution
  • Strengths
  • Weaknesses

Guidance

  • Adopt CASB Features Incrementally and Based on Risk
    • Prioritize Lower-Risk Features for Early Adoption
    • Assess Higher-Risk CASB Features for Later-Stage Adoption
  • Determine Whether CASB Encryption Is Really Needed
  • Take a Cloud-First Approach to CASB Deployment
  • Take a Multisolution View for the End Goal
  • Exploit the Ability to Experiment, Which Is a Strength of the Cloud

Gartner Recommended Reading

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.