Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      1 April 2026
      R12.1-billion wasted as government IT projects collapse - Sita

      R12.1-billion wasted as government IT projects collapse

      1 April 2026
      DStv 4K streaming launch is not imminent

      R99 DStv deal to keep Showmax subscribers from bolting

      1 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
    • World

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
    • In-depth
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
    • TCS
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Combine access to data with robust security protocols

    Combine access to data with robust security protocols

    By First Distribution powered by AVeS Cyber Security6 November 2019
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    To be efficient and productive, the right people within your organisation need to access the right data and apps at the right time. This means your business requires the best tools to stay safe in the cloud.

    Exclusively distributed by First Distribution as part of the FD CloudSecure range of products, powered by AVeS Cyber Security.

    As a business owner operating in a highly competitive environment, you require a set of tools, systems and platforms that can ensure your organisation is productive, efficient and at the top of its game, all the time. Your entire team needs the ability to access these tools as well — often when they are working remotely.

    This is today’s always-on work environment. It supports virtual employees, working offsite and the ability to be productive at any time, from anywhere.

    These capabilities are only possible because of strong security measures, protocols and tools that protect your business’s data, your customers’ data and who has access to the various apps and platforms that you use to get things done.

    Cloud access security brokers (CASBs) are the cornerstone of this vital security layer that needs to protect every organisation. Microsoft has directed significant energy, resources and innovation towards creating a uniquely integrated CASB.

    The role of CASBs in your business

    Gartner describes cloud access security brokers (CASBs) as on-premises or cloud-based security policy enforcement points. These are placed between cloud service consumers and cloud service providers. As cloud-based resources are accessed, CASBs combine and interject enterprise security policies.

    In other words, CASBs protect you and your organisation each time you access your data, a platform, a SaaS or app through your cloud-based platform, such as Microsoft Azure.

    CASBs give organisations the ability to embrace the possibilities of their cloud apps and services securely, and they can be crucial in driving a successful cloud security strategy

    Microsoft has jumped into the Challenger position in Gartner’s 2018 Magic Quadrant for Cloud Access Security Brokers (CASBs). It has also solidified its leadership position in KuppingerCole’s 2018 Leadership Compass in the same product category, backed by consistent customer adoption rates. According to Yinon Costica, director of programme management, Cloud Security Group at Microsoft, this is because of a year of product updates and innovations.

    What does this mean for your business, though? CASBs give organisations the ability to embrace the possibilities of their cloud apps and services securely, and they can be crucial in driving a successful cloud security strategy.

    While the market for CASBs is still relatively young, Gartner predicts that 60% of large enterprises will be using CASB technologies by 2020, with independent forecasts expecting to reach a total addressable market of US$7.5-billion in the same timeframe.

    Microsoft’s growth in this area supports these predictions, having experienced a steep increase in the adoption of Microsoft Cloud App Security across all customer segments, from small and medium enterprises to large corporates.

    The Microsoft difference

    According to Costica, Microsoft Cloud App Security is uniquely positioned to drive innovation in the CASB space because it integrates with leading security, identity and productivity solutions across Microsoft 365.

    Recent additions include Microsoft’s native integration with Windows Defender Advanced Threat Protection and a consistent labelling experience via Azure Information Protection. A consistent labelling experience means that you can define policies in one place and not have to translate them across solutions, clouds or premises.

    Among many others, these help organisations gain visibility into their cloud apps and services, provide sophisticated analytics to identify and combat cyberthreats, and control the sharing of sensitive information to support both Microsoft’s native cloud services as well as numerous third-party cloud apps and services, such as Dropbox, Salesforce and others.

    Identity and access management

    An essential component in Microsoft’s overall CASB solution is Azure Active Directory (AD), Microsoft’s identity and access management solution.

    Azure AD is designed to give IT administrators the tools they need to manage users, applications, data and various other aspects of their organisation’s network. It keeps data safe while giving the right users access to the applications and data they need to get their jobs done quickly and efficiently.

    As an international leader in the CASB field, Microsoft is continuously working on perfecting its various solutions, how they integrate with other solutions, and how they keep businesses — like yours — safe and operating productively to maintain their competitive edge.

    Protect your data today

    To protect personal and sensitive information, First Distribution has partnered with AVeS Cyber Security, specialists in cloud security and governance. We’ve found that the first step to protecting a business’s data is understanding where the critical gaps lie.

    Find out how you can secure your business against cyber-threats effectively with Azure Active Directory with your free Mitigate business risks and protect your data with Azure Active Directory white paper.

    About First Distribution
    First Distribution is a value-added distributor of leading global brands, providing complex ICT solutions to the enterprise and SME markets. They have based the First Distribution model on delivering solutions through trusted, established resellers. Their client base has been built up through a history of consistent trustworthy service and nurturing resellers as business partners. For more information, visit First Distribution.

    About AVeS
    AVeS help organisations in Southern African achieve confidence in their digital information. Following our tried and tested six-step methodology, we holistically assess IT strategies and operations, advise both business and IT on how to align their efforts to business objectives, and implement best-practices in governing and architecting information technology investments with less risk, more built-in efficiency and better adoption across the organisation. For more information, please visit AVeS.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    AVeS Cyber Security First Distribution Microsoft
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleTelkom trading update sends share price tumbling
    Next Article Gold-backed cryptocurrency launched

    Related Posts

    Microsoft rolls out big Copilot upgrades

    Microsoft rolls out big Copilot upgrades

    31 March 2026
    Defend your cloud with Altron Digital Business

    Defend your cloud with Altron Digital Business

    26 March 2026
    AI is coming to your accounting software

    Sage bets AI can save small business owners from admin hell

    13 March 2026
    Company News
    Mining's problem isn't output, it's execution - Workday

    Mining’s problem isn’t output, it’s execution – Workday

    1 April 2026
    Paratus launches Starlink-powered connectivity for Africa's essential services - Paratus Essential Access

    Paratus launches Starlink-powered connectivity for Africa’s essential services

    1 April 2026
    How consumers can identify a true QLED TV

    How consumers can identify a true QLED TV

    30 March 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Sars to give every taxpayer a digital identity in sweeping tech overhaul

    Sars to give every taxpayer a digital identity in sweeping tech overhaul

    1 April 2026
    R12.1-billion wasted as government IT projects collapse - Sita

    R12.1-billion wasted as government IT projects collapse

    1 April 2026
    DStv 4K streaming launch is not imminent

    R99 DStv deal to keep Showmax subscribers from bolting

    1 April 2026
    TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

    TCS | MTN’s Divyesh Joshi on the strategy behind Pi

    1 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}