A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premisesinfrastructure and acloud provider's infrastructure. A CASB tool provides a unified and consistent method of delivering cloud security for an organization to access cloud resources.
CASBs are designed to combine and enforce an organization'ssecurity policies when accessing cloud-based resources. They help prevent potential threats that can occur when an organization adds cloud-based networking to its IT infrastructure. CASBs are particularly important for maintaining data security, compliance and threat protection.
CASBs combine security policies, such asauthentication, authorization, role-based access control, credential mapping,encryption, logging andmalware detection. A CASB tool sits between on-premises infrastructure and the cloud, ensuring that all traffic sent to the cloud complies with security policies before being sent, minimizing the security risk.
CASBs are available as on-premises and cloud-based software, as well as software as a service (SaaS).
CASBs ensure network traffic between on-premises devices and the cloud provider complies with an organization's security policies, such as controlling access and identifying suspicious activity.
The value of cloud security brokers stem from their ability to deliverinsight into cloud application use across cloud platforms and identify unsanctioned use. This is especially important in regulated industries.
CASBs work in a discovery, classification and remediation process. The discovery process identifies in-use cloud applications, the classification process assesses each application and creates a risk factor, and the remediation process identifies and resolves detected threats based on the organization's security policy.
CASBs use auto-discovery to identify cloud applications in use, high-risk applications, high-risk user devices and other key risk factors. Cloud access security brokers enforce several different security access controls, including encryption and device profiling. They can also provide other services, such as credential mapping when single sign-on (SSO) isn't available andthreat intelligence.
CASBs sit between an organization's on-premises software and a cloud service's infrastructure.
A CASB acts as a gatekeeper, enabling organizations to extend the reach of their security policies beyond their own infrastructure.
The core components of a CASB are the following:
I
The principal benefit of a CASB is that it facilitates secure connections between users and cloud services. To achieve a secure environment, CASBs offer the following features:
Despite the many important benefits of a CASB, a few challenges need to be considered.
CASB tools have evolved to include, or work alongside, other IT security services -- although some vendors still offer standalone tools. CASBs are particularly useful in organizations withshadow IT operations or liberal security policies that allow operating units to procure and manage their own cloud resources.
Potential uses for CASB tools include the following:
CASBs can be based on an inline proxy or an application programming interface (API). Each provides the necessary security to protect the data heading to a cloud service.
Before data traffic reaches a cloud vendor, an inline proxy-based CASB captures the transaction and provides the required security protection. The proxy helps facilitate the CASB connection. It is also the way early CASBs handled data traffic.
API-based CASBs, by contrast, deliver security activities on data heading to the cloud through APIs already in place in SaaS cloud services. This way a separate arrangement for handling proxies can be eliminated.
There are numerous vendors that provide CASBs. The following is just a sample of vendors and tools in the cloud access security space:
To meet the needs of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) users, CASB vendors have added or expanded functionality for security tasks, such as the following:
CASBs will continue to be adopted in secure access service edge (SASE) architectures. SASE is a cloud architecture model that bundles network and cloud-native security technologies to deliver them as a single cloud service. A SASE solution helps an organization unify its network and security tools in one management console. These tools typically bundle SD-WANs with network security measures, such asfirewall as a service, secure web gateways, zero-trust network access and CASBs.
CASBs are commonly included in SASE tools, as they provide the access control, policy enforcement, threat prevention and visibility features that are essential to protecting cloud-based resources. Alongside other security and cybersecurity services CASB solutions will likely become a core component of SASE architectures.
The future of CASBs also depends on the increase and severity ofcyberthreats, such as ransomware; their ability to comply with key regulations, such as the GDPR, HIPAA and CCPA; and their ways of managing deployment costs.
Learn more aboutSASE and its use cases, as well as benefits and issues it presents for organizations.
Many organizations want to simplify or scale down their data centers -- but they won't disappear. Admins can examine as-a-service...
Follow this step-by-step guide on decommissioning a data center, covering planning, inventory management, data security, and ...
Smart data centers reduce costs and enhance grid stability, enabling operators to evolve from passive consumers to active ...
DevOps in 2026 is evolving fast, with AI-driven automation, platform teams, smarter tools, cost-aware deployments and new skills ...
Rapid IT incident resolution is a business capability driven by unified visibility, automation, clear escalation, strong ...
HP, Intuit, Oracle, State Farm, Thermo Fisher and Uber are signed on to work with OpenAI engineers on overcoming what the vendor ...
Compare Datadog vs. New Relic capabilities including alerts, log management, incident management and more. Learn which tool is ...
Many organizations struggle to manage their vast collection of AWS accounts, but Control Tower can help. The service automates ...
There are several important variables within the Amazon EKS pricing model. Dig into the numbers to ensure you deploy the service ...
Take advantage of Horizon 7 with VMC on AWS for a better hybrid cloud user experience, new use cases, and several different ...
Hock Tan talked only for several minutes during the keynote at VMware Explore 2025, but in that time, he laid the groundwork for ...
The first major revision of the VMware platform under Broadcom's ownership is now available to all VMware Cloud Foundation and ...

