{"id":39850,"date":"2021-03-04T17:00:04","date_gmt":"2021-03-04T17:00:04","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92848"},"modified":"2021-03-04T17:00:04","modified_gmt":"2021-03-04T17:00:04","slug":"a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/","title":{"rendered":"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security"},"content":{"rendered":"<p>Today\u2019s business uses an average of 1,180 cloud apps\u00b9, with many of those organizations securing their apps through cloud access security brokers (CASB). The organizational need for a CASB has grown alongside the use of cloud apps to enable remote work and greater user productivity. When security responsibilities for cloud apps are shared between you and the cloud application or cloud provider, there\u2019s a chance that some key security practices may be overlooked.<\/p>\n<p>Beyond the areas where your IT team or the platform provider are responsible for security, some SaaS apps and services may fall into an unprotected gray zone. According to the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/shared-responsibility\" target=\"_blank\" rel=\"noopener noreferrer\">shared responsibility model<\/a>, IT teams are responsible for securing their organizations\u2019 identity and access management (IAM), network resources, endpoints, devices, passwords, and more. But there\u2019s currently not much clear guidance around SaaS Security Posture Management (SSPM). That\u2019s where the right CASB can make the difference.<\/p>\n<h2>How the right CASB can help<\/h2>\n<p>A CASB is designed to analyze session traffic to and from the cloud, as well as highlight risks and block inappropriate access. With so many people now working remotely on personal devices, a CASB helps ensure that users accessing your cloud apps (having been properly authenticated by your identity provider) have the rights and permissions to use the selected app\u2014provided it\u2019s from an allowed device, and the session adheres to any other policy conditions defined by your organization.<\/p>\n<p>To accomplish all this, a CASB usually provides three primary services\u2014app discovery and management, secure access to all your apps, data protection, and threat protection. App discovery tells you which cloud apps the employees in your organization are accessing and helps you decide how to manage those apps. Data protection ensures that your people aren\u2019t accessing, using, and sharing sensitive data, and threat protection helps defend against inappropriate use of applications through malware, ransomware, or other threats.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92860 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/MCAS_Web_Graphic_PNGFILE.png\" alt=\"A diagram showing the Microsoft Cloud App Security and its integration with CSAB solutions \" width=\"8000\" height=\"3125\"><\/p>\n<p>For a large healthcare organization such as <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/760504-stlukes-casestudy-healthprovider-m365\" target=\"_blank\" rel=\"noopener noreferrer\">St. Luke\u2019s<\/a>, adopting <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise-mobility-security\/cloud-app-security\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Cloud App Security<\/a> enabled them to allow or block apps based on compliance with the Health Insurance Portability and Accountability Act (HIPAA) and reduce the possibility of leaked patient data.<\/p>\n<blockquote>\n<p><span class=\"TextRun SCXW145748478 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145748478 BCX8\">\u201cOne of our challenges prior to deploying Cloud App Security was detecting&nbsp;<\/span><\/span><a class=\"Hyperlink SCXW145748478 BCX8\" href=\"https:\/\/en.wikipedia.org\/wiki\/Shadow_IT\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW145748478 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145748478 BCX8\" data-ccp-charstyle=\"Hyperlink\">shadow IT<\/span><\/span><\/a><span class=\"TextRun SCXW145748478 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145748478 BCX8\">,\u201d said Erin Boris, Information Security Strategic Specialist at SLUHN. \u201cGaining that visibility through Cloud App Security helps us with software inventory, app rationalization, and most importantly, data loss prevention.\u201d&nbsp;<\/span><\/span><span class=\"EOP SCXW145748478 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<\/blockquote>\n<h2>Bridging the gap<\/h2>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/tutorial-cloud-platform-security\" target=\"_blank\" rel=\"noopener noreferrer\">SaaS Security Posture Management<\/a> is a solution category that is part of the broader security posture management umbrella of features, specifically protecting SaaS products such as <a href=\"https:\/\/www.office.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Office 365<\/a>, Google Workspace, or Salesforce.<\/p>\n<p>Gartner included SaaS Security Posture Management in the 2020 <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/top-actions-from-gartner-hype-cycle-for-cloud-security-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner Hype Cycle for Cloud Security<\/a>, defining SaaS Security Posture Management as \u201ctools that continuously assess the security risk and manage the security posture of SaaS applications\u2014offering suggestions for improved configuration to reduce risk.\u201d<\/p>\n<p>A CASB should help your team discover all SaaS apps within its purview, then determine which are shadow IT (a potential attack surface and a vector for malware). SaaS Security Posture Management takes it one step further to identify the abuse of these apps, identify misconfigurations, track configuration changes, and deploy automatic remediation to prevent data leakage and damage. SaaS Security Posture Management also covers SaaS storage, file sharing, and collaboration apps, which can be sources of data leakage.<\/p>\n<h2>The Microsoft Cloud App Security difference<\/h2>\n<p>Microsoft Cloud App Security helps secure all your cloud apps using sophisticated analytics to combat cyber threats across both cloud-native and on-premises apps and services, Microsoft and non-Microsoft alike. Recognized as a <a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-24F36UR7&amp;ct=201021&amp;st=sb\" target=\"_blank\" rel=\"noopener noreferrer\">Leader in Gartner Magic Quadrant for Cloud Access Security Brokers<\/a><sup>2<\/sup>, Cloud App Security addressed key features this way:<\/p>\n<ul>\n<li><strong>Shadow IT discovery:<\/strong> Discover&nbsp;and manage&nbsp;unauthorized&nbsp;access&nbsp;that can put your security at risk&nbsp;via&nbsp;integration with&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/endpoint-defender\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Defender for Endpoint<\/a>,&nbsp;or also&nbsp;leverage your firewall and secure web gateway, and then choose to sanction or&nbsp;unsanction&nbsp;apps.<\/li>\n<li><strong>Information protection<\/strong>: Gain the power to enforce complex information and data loss prevention (DLP) policies across third-party apps through deep integration with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/information-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Information Protection<\/a>, combined with the reverse proxy capabilities of Microsoft Cloud App Security.<\/li>\n<li><strong>Threat protection:<\/strong> Leverage the protection of the independent threat protection capabilities in MCAS, including our own UEBA capabilities as well as the native integration with Microsoft Defender suite, which includes Microsoft Defender for Endpoint, Microsoft Defender for Office, and <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/identity-defender\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Defender for Identity<\/a> to provide a unified view into devices, Office apps, and identities across on-premises and cloud resources. Monitor behaviors and blocking nefarious content.<\/li>\n<li><strong>Secure access<\/strong>: Connect with <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Active Directory<\/a> (Azure AD) to enforce and monitor access and session policies (such as leveraging conditional access from Azure Active Directory) across all managed cloud resources.<\/li>\n<li><strong>Security Posture Management:<\/strong> the recommendations and security practices that ensure each organization has intentionally set aside a standard of practices and then receives and implements the practices that help them achieve their goals.\n<ul>\n<li><strong>CSPM:<\/strong> <a href=\"https:\/\/azure.microsoft.com\/en-us\/resources\/videos\/azure-friday-cloud-security-posture-management-cspm-with-azure-security-center\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud Security Posture Management<\/a> provides multi-cloud security recommendations for the various workloads across IaaS such as AWS, GCP, and Azure.<\/li>\n<li><strong>SSPM: <\/strong>SaaS Security Posture Management helps secure multi-app environments and provide discovery for your SaaS apps, helping you identify misconfigurations, as well as track user activity and configuration changes\u2014all to protect your data and to keep you compliant.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span data-contrast=\"none\">According to Forrester\u2019s recent&nbsp;<\/span><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/07\/07\/new-study-customers-save-time-resources-improve-security-microsoft-cloud-app-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Total Economic Impact (TEI) study<\/span><\/a><span data-contrast=\"none\">, Cloud App Security also helps customers save time and resources\u2014delivering&nbsp;<\/span><span data-contrast=\"auto\">151% ROI over three years and less than 3-month payback. Other key findings include:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<ul>\n<li>80 percent reduction in time to monitor, assess, and govern cloud application portfolio risks.<\/li>\n<li>75 percent elimination of threats automatically due to increased visibility and automated threat protection.<\/li>\n<li>40 percent reduction in the likelihood of a data breach, with potential savings of more than $1.6 million over three years.<\/li>\n<li>90 percent reduction in hours required to audit cloud apps.<\/li>\n<\/ul>\n<p>In all of your efforts to protect your cloud apps, Microsoft Cloud App Security delivers an easy and flexible solution with a <a href=\"https:\/\/tools.totaleconomicimpact.com\/go\/microsoft\/CloudAppSecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">basic investment of 15 hours to deploy<\/a>. You\u2019ll benefit from recommendations for your cloud security posture (based on <a href=\"https:\/\/www.cisecurity.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Center for Internet Security<\/a> standards), as well as suggestions on risk scoring for apps, connected information protection, labeling and encryption, and granular session controls from start to finish of every session. And Cloud App Security can grow incrementally, enabling the perfect balance between security for your organization and productivity for your users.<\/p>\n<h2>Learn more<\/h2>\n<p>For further information on how your organization can benefit from Microsoft Cloud App Security, connect with us at the links below:<\/p>\n<p>Follow the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-security-and\/welcome-to-the-mcas-ninja-blog-series\/ba-p\/1775379\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Cloud App Security Ninja blog<\/a> and learn about <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-security-and\/the-microsoft-cloud-app-security-mcas-ninja-training-is-here\/ba-p\/1877343\" target=\"_blank\" rel=\"noopener noreferrer\">Ninja Training<\/a>.<\/p>\n<p>Go deeper with these interactive guides:<\/p>\n<p><strong>To experience the benefits of full-featured CASB, sign up for a <\/strong><a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise-mobility-security\/cloud-app-security\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>free trial\u2014<\/strong><strong>Microsoft Cloud App Security<\/strong><\/a><strong>.<\/strong><\/p>\n<p>Follow us on LinkedIn at <a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:6757823818808594432\/?updateEntityUrn=urn%3Ali%3Afs_feedUpdate%3A%28V2%2Curn%3Ali%3Aactivity%3A6757823818808594432%29\" target=\"_blank\" rel=\"noopener noreferrer\">#CloudAppSecurity<\/a>. To learn more about Microsoft Security solutions <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> on Twitter, and <a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security<\/a> on LinkedIn for the latest news and updates on cybersecurity.<\/p>\n<hr>\n<p><em>\u00b9<a href=\"https:\/\/go.netskope.com\/rs\/665-KFP-612\/images\/NS-Cloud-Report-Winter18-RS-00.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Netskope report<\/a>, 2018<\/em><\/p>\n<p><em><sup>2<\/sup>Gartner Magic Quadrant for Cloud Access Security Brokers, Craig Lawson, Steve Riley, October 28, 2020.<\/em><\/p>\n<p><em>The Gartner document is available upon request from Microsoft.<\/em><\/p>\n<p><em>Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner\u2019s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/04\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how Microsoft Cloud App Security helps manage your SaaS apps and services, protecting against cyber threats, data leaks, and lack of compliance.<br \/>\nThe post A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39851,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-39850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-04T17:00:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"8000\" \/>\n\t<meta property=\"og:image:height\" content=\"3125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security\",\"datePublished\":\"2021-03-04T17:00:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/\"},\"wordCount\":1309,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/\",\"name\":\"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png\",\"datePublished\":\"2021-03-04T17:00:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png\",\"width\":8000,\"height\":3125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/","og_locale":"en_US","og_type":"article","og_title":"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-04T17:00:04+00:00","og_image":[{"width":8000,"height":3125,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security","datePublished":"2021-03-04T17:00:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/"},"wordCount":1309,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/","url":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/","name":"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png","datePublished":"2021-03-04T17:00:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security.png","width":8000,"height":3125},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/a-better-cloud-access-security-broker-securing-your-saas-cloud-apps-and-services-with-microsoft-cloud-app-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"A better cloud access security broker: Securing your SaaS cloud apps and services with Microsoft Cloud App Security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39850"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39850\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39851"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}