Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Evolution of CASB Survey Report
Evolution of CASB Survey Report

Evolution of CASB Survey Report

Release Date: 07/05/2020

The study on CASB, which queried more than 200 IT and security professionals from a variety of organization sizes and locations, examined the expectations, technical implementations, and challenges of using cloud security access brokers (CASB). The study examined unrealized gaps between the rate of implementation or operation and the effective use of the capabilities within the enterprise, demonstrating a considerable misalignment between the technology solutions that fit in the CASB market and its perceived strengths.
Download this Resource

Bookmark
Share
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
Why Business Risk Should be Your Guiding North Star for Remediation
Why Business Risk Should be Your Guiding North Star for Remediation
Published: 04/25/2024
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust
How to Prepare Your Workforce to Secure Your Cloud Infrastructure w...
Published: 04/24/2024
Neutralizing the Threat with Cloud Remediation
Neutralizing the Threat with Cloud Remediation
Published: 04/23/2024
10 Tips to Guide Your Cloud Email Security Strategy
10 Tips to Guide Your Cloud Email Security Strategy
Published: 04/17/2024

Acknowledgements

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Itir Clarke Headshot Missing
Itir Clarke

Itir Clarke

This person does not have a biography listed with CSA.

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

This person does not have a biography listed with CSA.

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

This person does not have a biography listed with CSA.

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

This person does not have a biography listed with CSA.

Courtney Stiven
Courtney Stiven
Vice President of Global Marketing, CSA

Courtney Stiven

Vice President of Global Marketing, CSA

Courtney Stiven serves as the Vice President of Global Marketing for the Cloud Security Alliance. With over 15 years of experience in IT industry marketing, Courtney excels at translating complex technical information into digestible content for audiences of all levels. Her diverse background in corporate events, B2B communication, demand generation, digital marketing and campaign management paved the way for her to lead a team of global ma...

Read more

Joel Borgmeier Headshot Missing
Joel Borgmeier

Joel Borgmeier

This person does not have a biography listed with CSA.

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

This person does not have a biography listed with CSA.

Frank Guanco
Frank Guanco
Research Program Manager, CSA

Frank Guanco

Research Program Manager, CSA

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training