Article Details
Scrape Timestamp (UTC): 2025-03-27 11:29:18.678
Source: https://thehackernews.com/2025/03/new-report-explains-why-casb-solutions.html
Original Article Text
Click to Toggle View
New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It. Whether it's CRMs, project management tools, payment processors, or lead management tools - your workforce is using SaaS applications by the pound. Organizations often rely on traditional CASB solutions for protecting against malicious access and data exfiltration, but these fall short for protecting against shadow SaaS, data damage, and more. A new report, Understanding SaaS Security Risks: Why CASB Solutions Fail to Cover 'Shadow' SaaS and SaaS Governance, highlighting the pressing security challenges faced by enterprises using SaaS applications. The research underscores the growing inefficacy of traditional CASB solutions and introduces a revolutionary browser-based approach to SaaS security that ensures full visibility and real-time protection against threats. Below, we bring the main highlights of the report. Read the full report here. Why Enterprises Need SaaS Security - The Risks of SaaS SaaS applications have become the backbone of modern enterprises, but security teams struggle to manage and protect them. Employees access and use both sanctioned and non-sanctioned apps, each entailing their own types of risk. Breaking Down SaaS Risk Mitigation Capabilities Security solutions that mitigate the aforementioned SaaS risks, need to provide the following capabilities: The Limitations of CASB Traditionally, CASB solutions were used to secure SaaS apps. However, these solutions fall short when it comes to covering both sanctioned and unsanctioned apps, across managed and unmanaged devices. CASB solutions are made up of three main components: Forward Proxy, Reverse Proxy and API Scanner. Here's where they are limited: Plus, CASB solutions lack real-time granular visibility into app activity and have no ability to translate that into active blocking. The Browser as the Ultimate Security Control Point A paradigm shift is required: Securing SaaS applications directly at the browser level. Access and activity in any SaaS application, sanctioned or not, typically entails establishing a browser session. Hence, if we build the SaaS risk analysis capabilities into the browser, it would also be trivial for the browser to treat detected risks as a trigger for protective action – terminating the session, disabling certain parts of the web page, preventing download\upload, and so on. Browser Security vs. CASB: The Showdown Browser Security provides the following advantages: Read more about SaaS risk management and browser security protection in the white paper
Daily Brief Summary
SaaS applications are critical in modern enterprises, but present unique security challenges.
Traditional CASB solutions are inadequate for covering both sanctioned and unsanctioned SaaS apps across various devices.
CASBs typically utilize Forward Proxy, Reverse Proxy, and API Scanner but lack real-time, granular visibility and active blocking capabilities.
A significant security gap exists with "shadow" SaaS—applications used without IT's knowledge or approval.
The report introduces a browser-based security approach, proposing the browser as a more effective control point for SaaS security.
This new approach provides full visibility and real-time protection by integrating risk analysis directly into the browser, enabling instant protective actions.
Moving to browser-based security could potentially offer a more robust defense against SaaS-related security risks.