The primary aim of this is to explore CASBs as security measured implemented in cloud computing ecosystems.
Critically compare and contrast CASBs security features against IDS intrusion detection systems and firewalls.
Critically explore the effectiveness of CASBs in mitigating cloud computing security threats.
Identify the exceptional security elements available in only CASBs.
Research Question
What are the determinants of the implementation of cloud access security brokers (CASBs) in cloud computing systems?
Summary of Related Literature