The Netskope Active Platform

Similar documents
The 5 Steps to Cloud Confidence

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

The Cloud App Visibility Blindspot

Assessment & Monitoring

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

These materials are 2015 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

Google Identity Services for work

Vulnerability Management

APRIL CLOUD REPORT. Netskope Cloud Report for Europe, Middle East, and Africa

End-user Security Analytics Strengthens Protection with ArcSight

AirWatch Solution Overview

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents

Secure and control how your business shares files using Hightail

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Cloud App Security. Tiberio Molino Sales Engineer

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Security Overview Enterprise-Class Secure Mobile File Sharing

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Securing Content: The Core Currency of Your Business. Brian Davis President, Net Generation

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

How To Manage A Privileged Account Management

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

How APIs Turned Cloud on Security on Its Head

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

How To Buy Nitro Security

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.5

Paxata Security Overview

Administering Google Apps & Chromebooks for Education

Egnyte Cloud File Server. White Paper

Executive s Guide to Cloud Access Security Brokers

Securing and Monitoring Access to Office 365

Secure Cloud Computing

Meeting the Challenges of Virtualization Security

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

How To Manage Security On A Networked Computer System

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

activecho Frequently Asked Questions

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Ben Hall Technical Pre-Sales Manager

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

McAfee Web Reporter Turning volumes of data into actionable intelligence

APERTURE. Safely enable your SaaS applications.

Tableau Online Security in the Cloud

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Securing Office 365 with MobileIron

Securing Office 365 with Symantec

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Introduction to the Mobile Access Gateway

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

What We Do: Simplify Enterprise Mobility

Time to Value: Successful Cloud Software Implementation

Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps

APRIL CLOUD REPORT. Netskope Cloud Report Worldwide

Cenzic Product Guide. Cloud, Mobile and Web Application Security

owncloud Architecture Overview

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

Zscaler Internet Security Frequently Asked Questions

Understanding Enterprise Cloud Governance

How To Monitor Hybrid It From A Hybrid Environment

How to Define SIEM Strategy, Management and Success in the Enterprise

The Hybrid Cloud Advantage White Paper

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

ACI SELF-SERVICE BANKING

WALKME WHITEPAPER. WalkMe Architecture

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Security Information & Policies

What s New in Centrify DirectAudit 2.0

How To Protect Your Cloud From Attack

Agio Remote Monitoring and Management

WHITE PAPER AUGUST 2014

CLOUD ACCESS SECURITY BROKERS

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

How To Protect Your Mobile Device From Attack

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Transcription:

The Netskope Active Platform Enabling Safe Migration to the Cloud Massive Cloud Adoption Netskope is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across cloud apps so businesses can move fast, with confidence. Your organization is adopting cloud apps, and for good reason. They help users get their jobs done more quickly, easily, and flexibly than traditional software. While you re responsible for some apps, your users are now more than ever procuring and using these apps without your permission or involvement. This means you can t consistently manage and secure all of the cloud apps running in your organization. Whether shadow or sanctioned, cloud app usage is growing and C-suites, boards of directors, and audit committees around the world are beginning to ask whether the cloud technologies in their environments are safe, compliant with business policies, perform according to vendor service-level agreements, are cost-effective, and are optimized for business usage. Answering these questions is now an imperative. You need to monitor and enforce your security policies consistently across all of the cloud apps in your environment, whether you sanction them or not. You need to report on their compliance. And you need to do these things while enabling your users to move fast with the cloud. With the Netskope Active Platform, you can do both. The Netskope Active Platform Netskope is the leader in safe cloud enablement. The Netskope Active Platform gives IT the ability to find, understand, and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data, and ensure compliance in real-time, on any device, for any cloud app so the business can move fast, with confidence. There are three primary phases of safe cloud enablement that Netskope provides: find, understand, and secure. Find Netskope enables you to find all of the enterprise cloud apps that are running in your enterprise and understand your risk. We maintain scores on thousands of apps in the Netskope Cloud Confidence Index, which draws on objective security, auditability, and business continuity criteria adapted from the Cloud Security Alliance. Those apps scores are combined with your organization s specific usage to determine each app s risk and your overall cloud risk. 1

Understand Beyond finding cloud apps, the Netskope Active Platform gives you rich activity- and data-level usage details. With Netskope, you can answer questions such as Who s sharing sensitive content outside of the company, and with whom?, Do we have any PCI residing in our cloud apps?, and Are any of my non-u.s. users downloading PII from HR apps? In addition to answering specific questions, you can take advantage of our advanced anomaly detection to understand granular anomalies such as whether a user is excessively downloading and sharing, or logging in from multiple locations, which could indicate compromised credentials. These usage anomalies can indicate security threats, out-of-compliance behaviors, and even the presence of malware. Specifically, Netskope lets you drill down into: Apps, app instances, services, and sessions Users, roles, and enterprise directory groups Specific app activities, e.g., share or download Devices and browsers, e.g., IE, Firefox, and Chrome Time periods Geo-locations Content type, file type, file or object name, and DLP profile Where and with whom content is shared Secure After you understand which apps you have and what people are doing in those apps, you can enforce granular policies to protect data and comply with regulations. You can enforce those policies in context, specifying policies like Encrypt all content matching my confidential DLP profile in cloud apps, Block the download of any.exe file from a cloud storage app, or Alert on the download of PII from any HR app to a mobile device. This helps you narrow the policy aperture to a particular activity or a particular type of content you re trying to protect. It also helps you minimize false positives and be precise in your control. Beyond simply enforcing policies, Netskope lets you coach users to a desired behavior with automated messages in the product. For example, you can say You are uploading a sensitive document to Zippyshare. We have a corporate account with Box. Here is the URL to sign up, or even redirect the user to the correct app. Specifically, Netskope lets you enforce policies involving the following activities: AppID Create Delete/delete all Download/download all Edit Export Login failed Login successful Logout Markup Upload/print all Route (in procurement) Share Sync/restore Upload/import View/view all Admin activities 2

The Power of the Platform The above services are made more valuable by the Netskope Active Platform, which offers deep context. It starts with identity, which includes user, AD group, device, browser, location, and other contextual factors. Then it layers on the app, whether at the app, app instance, or category level. Then it takes activity into consideration: Is the user sharing content outside of the company? Downloading PII? Uploading ephi? Finally, it pulls in the data: What is the content? A record? A link? A file? If so, what kind of file? What is the name of this file? Does it trigger your DLP profile for PII? Anytime you perform a query or enforce a real-time policy, you can be very precise and granular with that contextual information in order to really understand your risk in its entirety and enforce policies that address the real risk, while still allowing the app. Phases Find Understand Secure Data Deep Context Activity App Identity Flexible Deployment Options The Most Flexible Deployment Options in the Market The Netskope Active Platform has the broadest and most flexible deployment options in the market, including thin agent, forward proxy, reverse proxy, log-based analysis, and app introspection. 3

Secure, Highly-Available Cloud The data analysis and policy enforcement components of the Netskope Active Platform are located in geographically-distributed Equinix data centers around the world. Data centers have redundant, multi-gbps Internet links that peer directly with all major carriers. The infrastructure is SSAE-16 certified and carries ISO and LEED certifications for safety and green data center standards. Netskope has certified its software deployment as SOC-1 Type I and II, and SOC-2 Type I and II through independent, third-party auditors. The Netskope Active Platform Architecture NETSKOPE APIs DEPLOYMENT OPTIONS PUBLIC CLOUD APPS (Thousands) REVERSE PROXY INTROSPECTION INTERNET ANALYTICS & REAL-TIME POLICY ENGINE PRIVATE/HYBRID CLOUD NETSKOPE ADMIN CONSOLE Netskope Discovery, Active Platform, Active DLP, and Active Encryption Netskope offers Netskope Discovery, an offline, log-based discovery, as well as the Netskope Active Platform and Netskope for Featured Apps that provide safe cloud enablement for a variety of specific cloud applications such as Box, Dropbox, Egnyte, Google Apps, Office 365, and Salesforce. Netskope Cloud DLP and Netskope Encryption can be added to round out configurations. See table, below, for specific functionality of each. 4

CAPABILITY NETSKOPE DISCOVERY NETSKOPE ACTIVE PLATFORM NETSKOPE FOR FEATURED APPS Discover all cloud apps Cloud Confidence Index Baseline visibility of cloud app activites FIND Deep visibility of cloud app activities Requires TAP interface or Active Deployment Requires TAP interface or Active Deployment Discovery of stored data Requires App Introspection UNDERSTAND Risk Dashboard Anomaly detection Custom reports Custom reports with AD integration Alert watchlists SECURE Real-time, granular control of all cloud apps Control stored data in sanctioned apps Cloud DLP Cloud DLP Cloud DLP Leverage on-premises DLP Strong Encryption Encryption Encryption Leverage on-premises HSM Geo-location-based policy enforcement Device-level access control User coaching Data quarantine Legal hold Ensure privacy with role-based access control, data obfuscation, and filtering of certain kinds of traffic (e.g., app activity using personal credentials) Integrate with AD to manage and secure apps and data within the context of users and groups FLEXIBLE DEPLOYMENT OPTIONS On-prem log parser TAP interface Agentless forwarder On-prem appliance (all data is maintained on customer premises) Reverse proxy Thin agent Mobile profile 5

About Netskope Netskope is the leader in safe cloud enablement. The Netskope Active Platform gives IT the ability to find, understand, and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data, and ensure compliance in real-time, on any device, for any cloud app so the business can move fast, with confidence. Netskope serves a broad customer base including leading healthcare, financial services, high technology, and retail enterprises, and has been named to CIO Magazine s top 10 cloud security startups and a Gartner Cool Vendor. 2015 Netskope, Inc. All rights reserved. Netskope is a registered trademark and Netskope Active, Netskope Discovery, Cloud Confidence Index, and SkopeSights are trademarks of Netskope, Inc. All other trademarks are trademarks of their respective owners. 04/15 DS-1-8