Abstract

Data breaches have gained widespread attention as businesses of all sizes become increasingly reliant on digital data, cloud computing, and workforce mobility. Cloud applications reduce costs and improve productivity. But it is equally important to monitor and protect data in a cloud environment. These are the questions that arise how to deal with lost visibility, unmanaged devices, and careless users. This paper explains how cloud access security brokers (CASBs) extend security to cloud applications, awareness for data breaches, providing visibility, threat protection, access control, and compliance. The key characteristics and benefits of cloud access security brokers (CASBs) are visibility, threat protection, access control and compliance are key components of this paper to extend data loss prevention (DLP). There is need to create the architecture of CABs having feature to deal with all types of Data Breaches. The result of the study provided a secure architecture to fulfill the security needs and tracks the complex connections between enterprise infrastructure and its cloud service provider.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.