CASBs and Education’s Flight to the Cloud

This post was originally published here by Jacob Serpa.

CloudĀ is becoming an integral part of modern organizations seeking productivity and flexibility. ForĀ higher education, cloud enables online course creation, dynamic collaboration on research documents, and more. As many cloud services likeĀ G SuiteĀ are discounted or given to educational institutions for free,Ā adoptionĀ is made even simpler. However, across the multiple use cases in education, comprehensive security solutions must be used to protect data wherever it goes. The vertical as a whole needs real-time protection on any app, any device, anywhere.

The Problems

ForĀ academic institutions, research is often of critical importance. Faculty members create, share, edit, and reshare various documents in an effort to complete projects and remain at the cutting edges of their fields. Obviously, using cloud apps facilitates this process of collaboration and revision. However, doing so in an unsecured fashion can allow proprietary information toĀ leakĀ to unauthorized parties.

Another point of focus in education is how student and faculty PII (personally identifiable information) is used and stored in the cloud. As information moves to cloud apps, traditional security solutions fail to provide adequate visibility and control over data. Obviously, this creates compliance concerns with regulations, like FISMA and FERPA, that aim to protect personal information.Ā Medical schoolsĀ have the additional requirement of securingĀ protected health information (PHI)Ā and complying withĀ HIPAA.

The Solutions

Fortunately,Ā cloud access security brokers (CASBs)Ā offer a variety of capabilities that address the above security concerns.Ā Data leakage prevention, for example, can be used to protect data and reach regulatory compliance. DLP policies allow organizations to redact data like PII, quarantine sensitive files, and watermark and track documents.Ā EncryptionĀ can be used to obfuscate sensitive data and prevent unauthorized users from viewing things like PHI. Contextual access controls govern data access based on factors like user group, geographical location, and more.

To secure cloud, present-day organizations must also secure mobile data access. Fortunately,Ā agentless mobile securityĀ solutionsĀ enable BYOD without requiring installations onĀ unmanaged devices. This is critical for ensuring device functionality, user privacy, and employee adoption. Some agentless solutions can enforce device security configurations like PIN codes, selectively wipe corporate data on any device, and more.

To learn more about how a CASB can help secure data, download the Definitive Guide to CASBs.

Photo:DynaSis

Ad

No posts to display