With the exponential growth of the cloud in recent years, many enterprises are finding themselves in need of customized security tools to protect their data and applications in the cloud. For this reason, many organizations are deploying cloud access security brokers (CASBs) to meet their specific security and compliance requirements for SaaS, IaaS, and custom-built applications.

However, when enterprises embark on a cloud security project, they quickly discover that there are multiple ways to deploy a CASB, each with it’s own capabilities and limitations, benefits and costs. Deciding on the right architecture for a project is one of the most important decisions a company can make since it impacts what CASB features apply to which users, devices, and services and under what conditions.

The enforcement point in the on-premises era was clear – it was at the network edge. In the cloud era, the perimeter is undefined. When deploying a CASB, how do organizations ensure they can enforce security controls across all cloud services, users and devices?

This eBook (download a free copy here) outlines the various CASB deployment modes and then describes the 20 most common CASB use cases, revealing which deployment mode best supports each of the use cases.