What Is a Cloud Access Broker and Do I Need One
Offered By: YouTube
Course Description
Overview
Explore the concept of cloud access brokers in this 22-minute conference talk from GrrCON 2015. Delve into Tom Doane's background and the evolution of network security. Learn about the purposes, functionality, and implementation of cloud access brokers. Discover real-world use cases, including examples from HP and Equinox, as well as applications in risk assessment, on-demand scanning, threat protection, and compliance. Gain insights into the importance of cloud access brokers in modern cybersecurity and understand how they can benefit your organization's cloud security strategy.
Syllabus
Intro
Toms background
The evolution of the network
What is a cloud access broker
Data in the cloud
Cloud access broker
Purposes
What is the cloud access broker
How does the cloud access broker work
Use case 1 HP
Use case 2 Equinox
Use case 3 Risk assessment
Use case 4 Ondemand scanning
Use case 5 Threat protection
Use case 7 Compliance
Use case 8 References
Call to action
Related Courses
Designing and Executing Information Security StrategiesUniversity of Washington via Coursera Caries Management by Risk Assessment (CAMBRA)
University of California, San Francisco via Coursera Diagnosing the Financial Health of a Business
Macquarie Graduate School of Management via Open2Study Enfermedades transfronterizas de los animales
MirÃadax Unethical Decision Making in Organizations
University of Lausanne via Coursera