BitGlass Security Software Reviews

A Cloud Access Security Broker (CASB) is a policy enforcement point that delivers data and threat protection in the cloud, on any device, anywhere. The Bitglass multi-protocol proxy architecture with Zero-Day Core ensures protection from known and unknown data leakage risks and malware threats, on managed and unmanaged apps, as well as on managed and unmanaged devices. For managed apps, Bitglass provides zero-day support for any application, providing real-time data & threat protection, identity and visibility. No catalog or signatures required. Bitglass’ agentless reverse proxy capability leverages patent pending AJAX-VM technology to ensure application resilience. For unmanaged apps, Bitglass' patented-pending machine-learning approach automatically identifies new applications and learns application behaviors and leakage paths, allowing coaching, blocking and zero-day control for any existing or new application on the user's network.

USP : Bitglass enables data security on any device without agents for managed applications. Their cloud access security broker (CASB) solution protects data end-to-end, from any cloud app to any device. Enforce access controls, limit sharing, protect against malware, avoid data leakage, and more. Bitglass Zero-day Unmanaged App Control enables discovery, blocking, and coaching of new and unknown cloud applications. Bitglass Next-Gen CASB with Zero-day Threat Protection, powered by Cylance, combines the best of traditional signature-based malware scanning with advanced Zero-day threat protection to thwart known and unknown attacks.

BUYERS
VENDORS
EXPERTS
2.0
ANALYSTS
 

BITGLASS detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support
2.45
3.70
2.45
Feature and Functionality
2.65
3.25
3.15
Deployment
5.00
3.70
5.00
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

BITGLASS has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Europe

    9 Participants

  • Niche Quadrant

    All-Middle East and Africa

    3 Participants

  • Niche Quadrant

    BFSI-All

    17 Participants

STRENGTHS
  • Product Maturity / Regulations compliance
    FISMA
  • Product Maturity / Regulations compliance
    GDPR
  • Product Maturity / Regulations compliance
    HIPAA
  • Product Maturity / Product Applications
    Network Security
  • Product Maturity / Regulations compliance
    PCI DSS
  • Product Maturity / Regulations compliance
    SOX
  • Product Maturity / Types of support services offered
    Customer Support
  • Product Maturity / Delivery Model
    Directly
  • Product Maturity / Deployment Model
    Hosted / On-Cloud
  • Product Maturity / Deployment Model
    On-Premise
  • Product Maturity / Organization size
    Small and Medium Enterprises
  • Product Maturity / Types of support services offered
    Technical Support
  • Product Maturity / Delivery Model
    Through Partners / Third-Party Vendors / MSSPs
  • Product Maturity / Type of solutions offered
    Business Continuity and Disaster Recovery
  • Product Maturity / Type of solutions offered
    Encryption
  • Product Maturity / Product Applications
    Pricing Strategy
  • Product Maturity / Product Applications
    Security as a service offerings
  • Product Maturity / Organization size
    Number of end users
  • Product Maturity / Product Applications
    Application Security
  • Product Maturity / Product Applications
    Database and Cloud Security
WEAKNESSES
  • Product Maturity / Product Applications
    Endpoint Security
  • Product Maturity / Regulations compliance
    GLBA
  • Product Maturity / Product Applications
    Web and Email Security
  • Product Maturity / Organization size
    Large Enterprises
  • Product Maturity / Types of support services offered
    Others, please specify
  • Product Maturity / Types of support services offered
    Post Purchase Support
  • Product Maturity / Type of solutions offered
    Continuous Monitoring
  • Product Maturity / Type of solutions offered
    Data Loss Prevention
  • Product Maturity / Type of solutions offered
    Email Security 
  • Product Maturity / Type of solutions offered
    Identity and Access Management
  • Product Maturity / Type of solutions offered
    Intrusion Management
  • Product Maturity / Type of solutions offered
    Security Information and Event Management
  • Product Maturity / Type of solutions offered
    Vulnerability Scanning
See More

Have you EVER used BITGLASS Products?

Share your experience with potential buyers.

TOP FEATURES
  • Regulations compliance
    PCI DSS
  • Deployment Model
    On-Premise
  • Types of support services offered
    Customer Support
  • Type of solutions offered
    Business Continuity and Disaster Recovery
  • Regulations compliance
    SOX
  • Delivery Model / Through Partners / Third-Party Vendors
    MSSPs
  • Regulations compliance
    HIPAA
  • Organization size
    Small and Medium Enterprises
  • Deployment Model / Hosted
    On-Cloud
  • Types of support services offered
    Technical Support

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

BITGLASS Presence in Security as a Service Startups

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS


...

Marie Stelle

Engagement Partner - 360Quadrants.com