Gartner Research

How to Secure Cloud Applications Using Cloud Access Security Brokers

Published: 16 August 2019

ID: G00393383

Analyst(s): Patrick Hevesi , Dennis Xu , Ramon Krikken


Cloud access security brokers have become an indispensable security add-on for cloud applications, especially for SaaS. This research helps security and risk management technical professionals compare and decide on CASB use cases, capabilities and architecture.

Table Of Contents


  • The Changing Face of Security for Cloud Applications
  • Common and Emerging Use Cases for CASBs
  • Common CASB Capabilities
  • How to Architecturally Integrate a CASB With Cloud Applications
  • How CASB Capabilities Relate to Enterprise Security Solutions
    • Cloud Application Discovery and Risk Rating Supported by SWG or ENFW Integration
    • Adaptive Access Control Supported by IAM and UEM Integration
    • Data Loss Prevention Augmented by Enterprise DLP Integration
    • User and Entity Behavior Analytics and Enterprise UEBA Integration
    • Threat Prevention Augmented by External UEBA and Malware Scan Integration
    • Client-Facing Encryption Augmented by Enterprise DRM, KMS, HSM Integration
    • Precloud Encryption and Tokenization Augmented by KMS or HSM Integration
    • BYOK Key Management Relies on KMS- or HSM-Generated Key Material
    • Monitoring and Log Management Augmented by SIEM Integration
  • Selecting CASB Capabilities and Architecture Options
    • Selecting Capabilities for Unapproved Applications
    • Selecting Capabilities for Approved Applications
  • Using CASBs for Data Encryption and Tokenization
  • Strengths
  • Weaknesses


  • Take a Cloud-First Approach to CASB Deployment
  • Select Use Cases and Capabilities by Using a Risk-Benefit Approach
    • Lower-Risk Features for Early Adoption
    • Medium-Risk Features for General Deployment
    • Higher-Risk CASB Features as the Exception

Gartner Recommended Reading

©2021 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.