YoVDO

What Is a Cloud Access Broker and Do I Need One

Offered By: YouTube

Tags

Conference Talks Courses Compliance Courses Data Protection Courses Risk Assessment Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of cloud access brokers in this 22-minute conference talk from GrrCON 2015. Delve into Tom Doane's background and the evolution of network security. Learn about the purposes, functionality, and implementation of cloud access brokers. Discover real-world use cases, including examples from HP and Equinox, as well as applications in risk assessment, on-demand scanning, threat protection, and compliance. Gain insights into the importance of cloud access brokers in modern cybersecurity and understand how they can benefit your organization's cloud security strategy.

Syllabus

Intro
Toms background
The evolution of the network
What is a cloud access broker
Data in the cloud
Cloud access broker
Purposes
What is the cloud access broker
How does the cloud access broker work
Use case 1 HP
Use case 2 Equinox
Use case 3 Risk assessment
Use case 4 Ondemand scanning
Use case 5 Threat protection
Use case 7 Compliance
Use case 8 References
Call to action


Related Courses

Designing and Executing Information Security Strategies
University of Washington via Coursera
Caries Management by Risk Assessment (CAMBRA)
University of California, San Francisco via Coursera
Diagnosing the Financial Health of a Business
Macquarie Graduate School of Management via Open2Study
Enfermedades transfronterizas de los animales
Miríadax
Unethical Decision Making in Organizations
University of Lausanne via Coursera