Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
The Most Addictive Python and SQL Courses
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the concept of cloud access brokers in this 22-minute conference talk from GrrCON 2015. Delve into Tom Doane's background and the evolution of network security. Learn about the purposes, functionality, and implementation of cloud access brokers. Discover real-world use cases, including examples from HP and Equinox, as well as applications in risk assessment, on-demand scanning, threat protection, and compliance. Gain insights into the importance of cloud access brokers in modern cybersecurity and understand how they can benefit your organization's cloud security strategy.
Syllabus
Intro
Toms background
The evolution of the network
What is a cloud access broker
Data in the cloud
Cloud access broker
Purposes
What is the cloud access broker
How does the cloud access broker work
Use case 1 HP
Use case 2 Equinox
Use case 3 Risk assessment
Use case 4 Ondemand scanning
Use case 5 Threat protection
Use case 7 Compliance
Use case 8 References
Call to action