You've requested...

Share this with your colleagues:

Best Practices for Securing SaaS with CASB

If a new window did not open, click here to view this asset.

Download this next:

Enterprise Security Architecture


A new approach to Information Security


Mark Brown, Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture.



  • Key trends in information security 2016 to 2012
  • The risk landscape in 2013
  • Key insights on the role of information security in UK businesses
  • Obstacles to effective information security
  • How to close the security gap
  • A roadmap for success
  • Key questions for businesses and business leaders
  • How to redesign the security architecture


This presentation was first given to a meeting of Computer Weekly’s CW500 Security Club: “Robust Security Architecture: Why you need it and how to get it,” in February 2013.


Click on the button below to download this report


These are also closely related to: "Best Practices for Securing SaaS with CASB"

  • Are your mission-critical applications secure?

    Are you secure? Your free application security guide awaits

    This guide includes:  

    •    3 methods to lessen application security risk
    •    5 lifecycle phases of secure DevOps
    •    OWASP’s best practices for embedded application security (plus potential pitfalls to know)

    Add your valuable security insights to our market research survey to access your application security guide.

  • Cloud Content Security: Understanding SaaS data protection

    Though security threats are increasing, the IT budget for security is not. In this expert e-guide, discover 4 ways enterprises are turning to Software-as-a-Service (SaaS) to increase scalability, lower costs and realize other benefits of cloud-based security services.

    Explore the pros and cons of various types of SaaS security, including:

    • Email security
    • Web filtering
    • Content security
    • And more

Find more content like what you just read:

  • The state of app security: Aligning development and security

    UBM conducted an online survey to explore common trends and challenges in app security, and to understand how security and development teams can work together to close these gaps. Click here for an inside look at the survey results.


  • The basics of IT security: How an MSSP can get you started

    New vulnerabilities emerge every day. It's critical to for organizations like yours to plan for and limit the impact of threats to data, applications, and infrastructure. Download The Strategic Guide to IT Security to learn how a Managed Security Service Provider (MSSP) can help you get started today.


  • The future of SecDevOps, containers and enterprise security

    Without better organizational discipline, digital businesses are at risk for massively disruptive data breaches and attacks. Can DevSecOps transform IT in time to avert disaster? Download this article to learn more.


  • Finding the balance between DevOps and security

    How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.


  • Security the future: Keeping up with the business

    Gareth Lindahl-Wise, group information security manager at British American Tobacco, explains the company's approach to enterprise security architecture.


  • How to prioritize and resolve security incidents faster

    This report provides a framework for evaluating the potential financial impact of investing in ServiceNow Security Operations to improve security incident and vulnerability response processes.


  • Protect a multi-cloud enterprise with an agile network security strategy

    In this white paper, learn how to create a multi-cloud network security strategy based on 3 key principles, and examine use cases to see how other organizations keep themselves secure.


  • Windows Server 2012 Security from End to Edge and Beyond

    This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.


  • How SOAR tools can ease the burden of required security tasks

    Who needs SOAR? Only those companies with understaffed, overworked IT security teams. Or in other words; most security teams. Learn how SOAR tools can help ease the burden of required security tasks and free up security pros for more challenging IT security projects.


  • 6 steps to implementing the "secure outside in" approach

    Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.


  • Reduce security flaw resolution time by 90%

    Check out this ROI analysis of Veracode's application security platform to find out just how much more secure your apps could be, and how you can reduce security flaw resolution time by 90%.


  • 10 things you should know about multi-cloud security

    Security should be an integral part of your cloud strategy. Designing and implementing security controls for your public cloud environment, requires a thorough understanding of the division of responsibilities between the cloud service provider and you as a customer. In this white paper, explore 10 things you should know about multi-cloud security.


  • Securing the enterprise application layer: Expert Guidelines

    If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.


  • What's the best way for you to secure SD-WAN?

    As enterprises shift more of their workloads to the cloud, they must also evaluate their networking architecture. A big part of this evaluation process is how and where to enforce security on data and applications. Download this white paper to learn about different security options available for SD-WAN and which one is right for you.


  • C-level guidance for protecting your most valuable data

    Learn how to improve your company's data protection strategies, reduce security spending, and reevaluate your vulnerabilities with business risk and ROI assessments.


  • IT Security Purchasing Intentions 2013

    This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.


  • Enterprise Security Architecture – an outsourcer's view

    Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture.


  • How to implement a successful application security program

    Network security is everywhere and we have all been hyperaware of securing the perimeter and having our firewalls on high alert. Now, application vulnerabilities are being exploited and it's time to do something about it. In this best practices guide, learn the steps to take towards implementing a successful application security program.


  • Application security: Understanding its current state

    This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.


  • Explore how to inject security into Agile development

    Security needs to be run inside an Agile sprint in order to keep the pace of development from slowing down too much. Check out this whitepaper on converting developers into Security Champions – developers with a direct impact on the resiliency and security of their firm's software.


  • Explore key findings from the Verizon Risk Report

    This Verizon Risk Report uses daily threat cyber-risk intelligence from multiple sources allowing businesses to make data-driven security decisions and focus their security spending on where it will have the most impact.


  • Security considerations for UK enterprises

    This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations.


  • Security for the PCI compliant environment

    This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.


  • Teaching coders how to integrate security into your application lifecycle

    84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.


  • The importance of application security testing tools

    In this Technology Spotlight report, IDC recommends application security testing tools that integrate security throughout the entire software development life cycle. Read on for an in-depth look at the role of WhiteHat Security in the marketplace for application security testing solutions.


  • Enable automated threat remediation without impacting business continuity

    In this white paper, learn about leveraging network and security elements equally in an open, multivendor ecosystem with centralized policy, analytics, and management—to transform a traditional network into a secure one.


  • The potential ROI of ServiceNow Security Operations

    Download this Forrester Total Economic Impact infographic for a summary of interview findings from 3 customers about their experience using ServiceNow Security Operations.


  • How to protect your business with security confidence

    No system or network is 100% secure. Attacks can happen to anyone, or any business, at any time. Find out how you can make security central to your business, and protect it against the likely threats that it will encounter.


  • Security Pay Rates: UK Permanent Salary Index February 2013

    This research from Acumin and Computer Weekly charts the rate for the job for over 60 IT security and compliance roles.


  • How this security company gained application security visibility

    Learn how this leading security company achieved immediate security visibility and blocking, without impacting their user experience.


  • Application security testing: Protecting your application and data

    Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.


  • How to secure IaaS/PaaS effectively

    In this white paper, learn about the impact of IaaS/PaaS on your security focus, your responsibilities under shared security models, and a security analysis of IaaS/PaaS vs. on-premise environments.


  • A new approach to security: Scalability tools

    In this white paper, find out how your organization can take a new approach to security in a containerized environment.


  • CW+: Overview of the Open Group Security Forum

    The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations.


  • How to secure cloud communications with 3 levels of defense

    Are you considering moving your business communications to the cloud, or upgrading your current VoIP service, but worried about the level of security you will get? Read this except from Intermedia's technical white paper "Not All Voice Clouds Are Created Equal" about what sets Intermedia voice cloud apart from the competition.


  • Protect yourself against these major security risks in 2019

    How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.


  • Explore the benefits of security orchestration and automation

    Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.


  • Important steps for building security into DevOps

    It's important to build security into your DevOps process. This is easier said than done, but take a look through this DevOps security guide to uncover how to shift security left, who should be responsible for security, and how to quickly improve the quality of the applications you are developing.


  • 3 steps you should take for improved cloud security

    Learn what's important when developing a strong program for maintaining continuous security while your business does business in the cloud.


  • SOC best practices

    The most successful security programs are rarely the ones with the largest security budgets or staffs. The effectiveness of security operations increases by leveraging existing resources in more productive ways. In this white paper, explore leverage areas for assuring SOC success while taking advantage of integration opportunities.


  • Building trust in the security of RFID systems

    This article in our Royal Holloway Information Security Thesis Series looks at the growing need for automated tools to verify protocols and address concerns over security and privacy.


  • Explore 13 ways to increase application security

    To ensure you have the technology necessary to build secure software, you'll want to put together a tool belt of solutions that address specific types of applications security weaknesses. Explore these 13 application security tools to learn what you should include as a part of your application security tool belt, and what to look for in each one.


  • Cloud security for mobile devices: Decrease your vulnerability

    With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.


  • Can security and DevOps work together?

    Today modern technical companies like Hulu have been adopting a culture where DevOps and security operate as one. In this webinar, hear from Emilio Escobar, Director of Information Security at Hulu, as he discusses how Hulu successfully brought security into the DevOps ecosystem, the benefits of a DevOps culture, and more.


  • Email security issues: How to root out and combat them

    Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.


  • Security Think Tank: Bring your own device

    With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does Mobile Device Management (MDM) really have a role? Leading security specialists offer their advice.


  • ISM Essentials Guide on Cloud and Virtualization Security

    Moving applications, development and data to the cloud means a new paradigm of IT and security management. You’ll need clear visibility into how data moves outside your organization, where it’s stored and who has access to it. This essential guide from ISM offers expert advice on security around your organization’s cloud computing efforts.