YoVDO

What Is a Cloud Access Broker and Do I Need One

Offered By: YouTube

Tags

Conference Talks Courses Compliance Courses Data Protection Courses Risk Assessment Courses Cloud Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of cloud access brokers in this 22-minute conference talk from GrrCON 2015. Delve into Tom Doane's background and the evolution of network security. Learn about the purposes, functionality, and implementation of cloud access brokers. Discover real-world use cases, including examples from HP and Equinox, as well as applications in risk assessment, on-demand scanning, threat protection, and compliance. Gain insights into the importance of cloud access brokers in modern cybersecurity and understand how they can benefit your organization's cloud security strategy.

Syllabus

Intro
Toms background
The evolution of the network
What is a cloud access broker
Data in the cloud
Cloud access broker
Purposes
What is the cloud access broker
How does the cloud access broker work
Use case 1 HP
Use case 2 Equinox
Use case 3 Risk assessment
Use case 4 Ondemand scanning
Use case 5 Threat protection
Use case 7 Compliance
Use case 8 References
Call to action


Related Courses

Cryptography II
Stanford University via Coursera
Microsoft Enterprise Mobility Suite
Microsoft via edX
Social Media - What No One has Told You about Privacy
openHPI
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX