We keep you safe in the cloud with our Microsoft 365 security and security hardening services Learn More
logo centrexit white
  • IT Services
    • manageIT
    • cloudIT
    • buildIT
    • guardIT
  • Who We Help
    • Industries
    • Biocom Members
  • Resources
    • Blog
    • Podcasts
    • Work From Home
  • About
    • Company
    • Team
    • Careers
  • IT Services
    • manageIT
    • cloudIT
    • buildIT
    • guardIT
  • Who We Help
    • Industries
    • Biocom Members
  • Resources
    • Blog
    • Podcasts
    • Work From Home
  • About
    • Company
    • Team
    • Careers
GET SUPPORT
GET STARTED
GET SUPPORT
GET STARTED
  • IT Services
    • manageIT
    • cloudIT
    • buildIT
    • guardIT
  • Who We Help
    • Industries
    • Biocom Members
  • Resources
    • Blog
    • Podcasts
    • Work From Home
  • About
    • Company
    • Team
    • Careers
  • IT Services
    • manageIT
    • cloudIT
    • buildIT
    • guardIT
  • Who We Help
    • Industries
    • Biocom Members
  • Resources
    • Blog
    • Podcasts
    • Work From Home
  • About
    • Company
    • Team
    • Careers

Blog

HomeBlog
CategoriesCloud,  Education,  SecurityFebruary 16, 2017November 10, 2020

What is a CASB & When Should You Use One?

Over the last year, I’ve been asked many times about Cloud Access Security Brokers (CASB)s. Even if people don’t use those words, the topic comes up over and over. This blog is a quick reference to discuss cloud authentication, Single-Sign-On (SSO) and other related technologies.

(more…)

Posts pagination

Previous Page 1 … Page 13 Page 14

Categories

  • Business
  • Cloud
  • Company News
  • Culture
  • Data Breaches
  • Education
  • Enterprise Security
  • Featured
  • Finance
  • Healthcare
  • IT CyberSecurity
  • Life Sciences
  • Non Profit
  • Operations
  • Podcast
  • Press Release
  • Security

Recent Posts

  • Close-up of a finger hovering above a keyboard key labeled EXECUTE, illuminated by screen glow against a dark background, representing the moment of human judgment before automated action
    24/7 IT Monitoring: What AI Handles vs. What Humans Handle
  • ai-cyberattack-speed-72-minutes-security-operations
    AI-Powered Attacks Now Steal Data in 72 Minutes
  • FBI seizure notice displayed on ALPHV BlackCat ransomware dark web site showing multi-agency law enforcement operation logos
    When Cybersecurity Professionals Become the Threat
  • Business professional reviewing policy document on laptop screen in office setting
    AI Acceptable Use Policy Template for Business
  • governance-without-red-tape-ai-policies-smbs
    Governance Without the Red Tape: AI Policies for SMBs
logo centrexit white
Facebook-f
Instagram
Tiktok
Linkedin
Twitter
Blank Image
12232 Thatcher Court
Poway, CA 92064
View map

Call Us

(619) 651-8700

  • Privacy Policy
  • COVID-19 Updates
  • Company
  • Careers
  • Blog
  • Contact
  • Get Support
  • manageIT
  • cloudIT
  • buildIT
  • guardIT
Copyright 2026 © centrexIT. All Rights Reserved. Design by: 01Guru
  • IT Services
    • manageIT
    • cloudIT
    • buildIT
    • guardIT
  • Who We Help
    • Industries
    • Biocom Members
  • Resources
    • Blog
    • Podcasts
    • Work From Home
  • About
    • Company
    • Team
    • Careers