sb-as logo
Story image

Bitglass receives US patent for SAML technology

01 Sep 2020

Bitglass has won a US patent for its SAML relay that helps to provide more transparency and real-time access control of cloud services.

SAML, which stands for security assertion markup language, has become popular in recent years as security vendors as an open standard for authentication and authorisation. 

Bitglass designed its SAML relay to allow a cloud access security broker (CASB) to be inserted into the traffic flow between users and cloud services during the login process, all in a transparent manner. 

Bitglass explains that once a user logs in, the CASB considers the risk profile of the user, and determines the level of access to permit the user. The CASB may permit direct access to the application, proxied and controlled access to the application with data and threat protection enforced, or deny access altogether.

Bitglass CEO Nat Kausik says, “This patent is further recognition that Bitglass is the architect of SAML relay and reverse proxy technology that all CASB vendors have imitated.”

“For organisations that need transparent cloud security, the Bitglass CASB remains the solution of choice. Today, it is a core component of our SASE offering, along with our SmartEdge Secure Web Gateway and our zero trust network access.” 

Bitglass CTO Anurag Kahol adds that the company recognises that organisations need cloud-based solutions that secure application access from both corporate and personal devices.

“Our SAML relay technology has become the standard for enabling secure, ubiquitous access,” says Kahol.

The company recently released a 2020 BYOD report which showed 69% of polled respondents enable employees to use personal devices to do their work. Partners, contractors, customers, and suppliers could also have their own BYOD policies. 

Due in part to the shift to mass adoption of remote working, businesses are embracing BYOD, however many are not taking the proper steps to secure data.

Respondents were most concerned about data leakage, unauthorised access to data and systems, and malware infections. 

However, 51% of respondents say they lacked visibility into file sharing apps 30% had no visibility or control over mobile enterprise messaging tools, and 9% had cloud-based anti-malware solutions in place.

Bitglass notes that organisations generally need physical access to devices to secure them – which is problematic and puts privacy at risk when it comes to personal devices. 

“To remedy this standoff, companies need comprehensive cloud security platforms that are designed to secure any interaction between users, devices, apps, or web destinations,” Kahol concludes.

Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Gartner: Security leaders must balance risk, trust and opportunity
Security and risk leaders must focus on balancing risk, trust and opportunity to help maintain the ability of their organisations to function.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More
Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More