What is Bitglass?

Bitglass delivers comprehensive data and threat protection for every interaction, irrespective of the device or location used. Its extensive global network, featuring over 200 points of presence, guarantees outstanding performance and reliability, thereby ensuring business continuity for organizations of all sizes. While transitioning to the cloud grants your organization increased flexibility and cost savings, it remains essential to retain control over your data. The cutting-edge Next-Gen Cloud Access Security Broker (CASB) solution from Bitglass enables your organization to safely engage with both managed and unmanaged cloud applications. The Zero-day CASB Core from Bitglass is crafted to consistently adapt to the dynamic nature of enterprise cloud environments, offering real-time defenses against data breaches and security threats. In addition, the Next-Gen CASB intelligently learns and evolves in reaction to new cloud applications, emerging malware threats, and the introduction of additional devices, guaranteeing thorough protection across all platforms. This remarkable adaptability renders Bitglass an indispensable ally in addressing the challenges associated with cloud security, as it continuously enhances its capabilities to meet the ever-evolving demands of modern enterprises.

Screenshots and Video

Bitglass Screenshot 1

Company Facts

Company Name:
Bitglass
Date Founded:
2013
Company Location:
United States
Company Website:
www.bitglass.com

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Support
Standard Support
Web-Based Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

Bitglass Categories and Features

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Application Security Software

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation