What Is a Cloud Access Broker and Do I Need One
Offered By: YouTube
Course Description
Overview
Explore the concept of cloud access brokers in this 22-minute conference talk from GrrCON 2015. Delve into Tom Doane's background and the evolution of network security. Learn about the purposes, functionality, and implementation of cloud access brokers. Discover real-world use cases, including examples from HP and Equinox, as well as applications in risk assessment, on-demand scanning, threat protection, and compliance. Gain insights into the importance of cloud access brokers in modern cybersecurity and understand how they can benefit your organization's cloud security strategy.
Syllabus
Intro
Toms background
The evolution of the network
What is a cloud access broker
Data in the cloud
Cloud access broker
Purposes
What is the cloud access broker
How does the cloud access broker work
Use case 1 HP
Use case 2 Equinox
Use case 3 Risk assessment
Use case 4 Ondemand scanning
Use case 5 Threat protection
Use case 7 Compliance
Use case 8 References
Call to action
Related Courses
Cryptography IIStanford University via Coursera Microsoft Enterprise Mobility Suite
Microsoft via edX Social Media - What No One has Told You about Privacy
openHPI Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX