Cloud security gateways are on-premises or cloud-based security policy enforcement points placed between cloud service consumers and cloud service providers to interject enterprise security policies as the cloud-based resources are accessed. Cloud security gateways consolidate multiple types of security policy enforcement. Example security policies include authentication, single sign-on, authorization, security token mapping, encryption, tokenization, logging, alerting, API control and so on.
Gartner Tech Conference & Webinar
The premier gathering of security leaders, Gartner Security & Risk Management Summit delivers the insight you need to guide your organization to a secure digital business future. The comprehensive agenda addresses the latest threats, flexible new security architectures, governance strategies, the chief information security officer (CISO) role and more.
Free Webinar: New technologies are enabling more secure innovation and agile IT. It’s time to advance your security program to deliver the trust and resilience the business needs to stay competitive. Get the answers you need by attending a webinar, hosted by Gartner analyst Tom Scholtz (Vice President and Gartner Fellow, Gartner Research, and Conference Chair at Gartner Security & Risk Management Summit 2017), on Managing Risk and Security at the Speed of Digital Business, on April 4 at 10:00 a.m. EST.
Read reviews of Cloud Storage Gateways…
Gartner Peer Insights has over 99 reviews on 10+ vendors in the Cloud Storage Gateways market. Learn about these companies and these products from IT professionals who have first-hand experience with them.