A cloud access security broker is a tool that intercepts and manages traffic between cloud applications and users....
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
While it can help secure a cloud environment, the tool may also impact users in undesirable ways, potentially decreasing productivity and leading to shadow IT. When evaluating a cloud access security broker, business and IT leaders need to consider the effects on user privacy, application usability and endpoint mobility.
A cloud access security broker tool deals with private employee traffic, meaning employees may be resistant to using applications that they feel puts personal traffic under a security microscope. Cloud access security brokers must be able to use policies or processes that accommodate a company's written acceptable use standards that every employee agrees to.
If adding a cloud access security broker tool slows cloud application performance or makes the application more difficult to use, users may shy away from that application. Instead, they might seek an alternative cloud application that is not constrained by the cloud access security broker -- which could increase shadow IT risks. IT teams should test and evaluate application performance both with and without the cloud access security broker to gauge the tool's impact on application performance. Then, they should use the results of that evaluation to optimize the application, adjust the infrastructure or select an alternate CASB tool.
A cloud access security broker also accommodates various endpoint devices, since users expect to log in to cloud applications from an increasingly diverse array of products. This kind of endpoint flexibility and cloud application persistence have been important factors in cloud adoption, and cloud access security broker tools should not inhibit that flexibility to any noticeable degree. Otherwise, users may resist using the cloud application in favor of other applications that a cloud access security broker does not protect. However, with cloud access security brokers gaining popularity, vendors will likely address this problem moving forward.
How cloud access security brokers help protect data
Minimize shadow IT risks in your enterprise
Learn how to evaluate cloud access security brokers
Related Q&A from Stephen J. Bigelow
VMware VIC security features, like isolation and user authentication, can improve enterprise container security so long as proper configuration and ...continue reading
VSphere Integrated Containers uses a combination of VIC engine, Project Harbor, Project Admiral and Photon OS to handle container provisioning, ...continue reading
OpenStack scheduled numerous hypervisors for deprecation in 2014's OpenStack Icehouse, but no others are scheduled for future releases, up to and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.