Netskope for Google Apps

Similar documents
The Netskope Active Platform

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

EDITION CLOUD REPORT HEALTHCARE AND LIFE SCIENCES LEAD IN FINDING AND PREVENTING SENSITIVE DATA LOSS

SUMMER 2015 WORLDWIDE EDITION CLOUD REPORT. sensitive data in the cloud

The 5 Steps to Cloud Confidence

JANUARY CLOUD REPORT 2015

APRIL CLOUD REPORT. Netskope Cloud Report Worldwide

KEYS TO CLOUD APP SECURITY

The Cloud App Visibility Blindspot

These materials are 2015 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.

The Cloud App Visibility Blind Spot

How APIs Turned Cloud on Security on Its Head

Empowering Your Business in the Cloud Without Compromising Security

2H 2015 SHADOW DATA REPORT

Executive s Guide to Cloud Access Security Brokers

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

APRIL CLOUD REPORT. Netskope Cloud Report for Europe, Middle East, and Africa

SELECTING AN ENTERPRISE-READY CLOUD SERVICE

APERTURE. Safely enable your SaaS applications.

Repave the Cloud-Data Breach Collision Course

CA Arcot RiskFort. Overview. Benefits

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents

How To Buy Nitro Security

Google Identity Services for work

The Top 7 Ways to Protect Your Data in the New World of

Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Netskope Cloud Report

Teradata and Protegrity High-Value Protection for High-Value Data

CyberArk Privileged Threat Analytics. Solution Brief

Managing the Challenges of the Cloud Under the New EU General Data Protection Regulation

Box: Redefining Security for the Cloud

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

Securing and Monitoring Access to Office 365

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

CLOUD REPORT OCTOBER 2014

Securing Content: The Core Currency of Your Business. Brian Davis President, Net Generation

Administering Google Apps & Chromebooks for Education

Assessment & Monitoring

Analyzing HTTP/HTTPS Traffic Logs

ForeScout MDM Enterprise

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

HIPAA and HITECH Compliance for Cloud Applications

THE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

Vulnerability Management

Office 365 Adoption & Risk Report

BeyondInsight Version 5.6 New and Updated Features

MOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER?

Google Apps Deployment Guide

The ForeScout Difference

SecureGRC TM - Cloud based SaaS

The Identity Defined Security Alliance

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

activecho Frequently Asked Questions

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Egnyte Cloud File Server. White Paper

Symantec Messaging Gateway 10.5

CLOUD ACCESS SECURITY BROKERS

What We Do: Simplify Enterprise Mobility

End-user Security Analytics Strengthens Protection with ArcSight

The Challenge of Securing and Managing Data While Meeting Compliance

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

STATE OF NEW YORK PUBLIC SERVICE COMMISSION

Stay ahead of insiderthreats with predictive,intelligent security

Unified Security, ATP and more

CASE STUDY. Global Airline Empowers Mobile Workforce for SaaS Apps while Reducing Risk

NCSU SSO. Case Study

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

CA Technologies Healthcare security solutions:

Cisco Advanced Malware Protection for Endpoints

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT

Now Leverage Big Data for Successful Customer Engagements

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

INCIDENT RESPONSE CHECKLIST

Intelligent Security Design, Development and Acquisition

ENABLING FAST RESPONSES THREAT MONITORING

What you need to know about cloud backup: your guide to cost, security and flexibility.

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

What is Windows Intune? The Windows Intune Administrator Console. System Overview

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Requirements When Considering a Next- Generation Firewall

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

GUIDE TO ENTERPRISE OFFICE 365 PLANS

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

WHITE PAPER AUGUST 2014

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Pivoting to Data-less Endpoints with High Security and Cloud Services. Robert Pell, Principal Architect, East Region Code42 Software

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

How To Manage Security On A Networked Computer System

Transcription:

Netskope for Google Apps Safe Cloud Enablement for Productivity and Collaboration at work Google Apps: An all-in-one suite to communicate, store and create More than 5 million organizations and 64% of the Fortune 500 rely on the Google Apps product suite as a key method for communication and collaboration. More than 5 million organizations and 64% of the Fortune 500 rely on the Google Apps product suite as a key method for communication and collaboration. Collaborative apps such as Docs, Sheets, Forms, and Slides along with communication apps such as Gmail, Hangouts, Google+, and Calendar present a wide range of valuable tools. Combined with Google Drive, Google s cloud-based storage platform, the Google Apps suite is a very powerful solution that is growing in popularity. According to the Netskope Cloud Report, both Gmail and Google Drive are among the top 10 used apps in enterprises. For many organizations, migration to Google Apps is a first foray, or at least a key move, in the cloud journey. It is often the seminal event that defines an organization s acknowledgement of cloud as a viable delivery mechanism for IT services, and is often followed by adoption of a wide variety of cloud services across the organization. Shared Responsibility in the Cloud The apps in the Google Apps suite are enterprise-ready by objective measures. They are rated high in the Netskope Cloud Confidence Index, a yardstick adapted from the Cloud Security Alliance that scores enterprise cloud apps on their security, auditability, and business continuity. The suite boasts key thirdparty certifications, flexible security settings, and privacy features. Despite these inherent capabilities, IT organizations are concerned about maintaining visibility and control over sensitive business data moving in and out of the suite and across its ecosystem, as well as user activity within the suite. In what s called a shared responsibility model, cloud app vendors are expected to build apps that are inherently enterprise-ready while the enterprises themselves need to be responsible for the activities that their users perform within the apps, such as uploading, downloading, or sharing of sensitive content. 1

Netskope for Google Apps Netskope is the leader in safe cloud enablement. Netskope for Google Apps enables you to confidently adopt the Google Apps suite. What does this mean to you? Building on the robust security capabilities inherent in Google Apps, and addressing the shared responsibility model between cloud vendors and their enterprise customers, Netskope gives you deep visibility and granular activityand data-level control across all of the apps that comprise the Google Apps suite, the Google Apps ecosystem of integrated apps, and any other cloud app your organization uses, sanctioned or unsanctioned. The Netskope Active Platform gives you rich visibility into activity- and datalevel usage details within every app in the Google Apps suite, along with the suite s ecosystem app. Visibility Across Google Apps and the Ecosystem Netskope gives you rich visibility into activity- and data-level usage details within every app in the Google Apps suite, along with the suite s ecosystem app. This allows you to answer questions such as Who s sharing sensitive content outside of the company, and with whom? across Google Docs, Sheets, Google Drive, Google+, or any Google app with a single query. Other common questions include, Do we have PCI residing in any of our Google apps, irrespective of when content was uploaded? or Is anybody downloading personally-identifiable information to a mobile device? Similarly, if content originally residing in Google Apps has been opened in another app, such as Microsoft Office 365, and then shared, Netskope would show that activity with the same query. In cases in which a line of business owns and administers Google Apps, but IT needs visibility for data security or compliance purposes, we can provide that visibility with no disruption to the business. Beyond one-off queries, this level of visibility makes possible several important use cases for enterprise IT, including forensic analysis following a suspected cloud data exposure, anomaly detection for detecting malicious activity, and e-discovery of sensitive content for compliance purposes. Visibility of Mobile and Remote Usage Users of Google Apps are often using the ecosystem remotely and in many cases outside of the company s secure perimeter. Whether from a mobile device or from a Mac or PC that is remote, getting deep visibility across Google Apps and the ecosystem is more important than ever. You don t know what you can t see. Netskope gives you deep visibility into Google Apps usage and activity involving both mobile and remote users. Gain 20/20 vision across all users and activity regardless of where they are connecting from. 2

For organizations standardizing on Google Apps, we can provide rich detection of activitylevel anomalies such as excessive downloading or sharing from a Google app, unusually heavy uploads to an app other than the Google App suite, or logins from multiple locations. Cloud Forensic Analysis Many customers use Netskope to create a granular cloud activity audit trail following a suspected event such as the theft of sensitive content upon employee departure. For an organization standardizing on Google Apps, this may include an employee logging into Google Docs or Google Drive using corporate credentials, downloading sensitive content, then logging into a totally different app such as Dropbox or Microsoft One Drive using personal credentials, uploading that same content, and then sharing it with a new employer. In just a few clicks, IT can reconstruct this activity in the form of a forensic audit trail to understand just what that user did with which content in which app, and if they shared the content, with whom they shared it. Cloud Usage Anomaly Detection Customers also use Netskope to detect anomalies. For organizations standardizing on Google Apps, we can provide rich detection of activity-level anomalies such as excessive downloading or sharing from a Google app, unusually heavy uploads to an app other than the Google App suite, or logins from multiple locations. These usage anomalies can indicate compromised credentials, out-of-compliance behaviors, and even the presence of malware. e-discovery of Sensitive Content Another aspect of deep visibility is the discovery of content that is already resident within cloud apps, irrespective of when it was uploaded or created. For Google Apps, Netskope enables you to find content that matches your DLP profiles, whether pre-defined or custom. We inspect all of the content you have within Google Apps using industry-standard DLP with 3,000+ data identifiers and covering nearly 500 file types, and supporting keyword search, pattern-matching, and regular expression. Once we discover content, we classify it and inventory content owners and users, provide sharing status (private, shared, or public), and enable you to restrict access, change ownership, download files for review, secure content with strong encryption, and notify content owners. Netskope lets you create, schedule, and share visual reports on all of the above, as well as export events easily via a REST API. This way you can include visibility about your Google Apps suite (as well as other cloud apps) within your current SIEM or other analytics tool. 3

Granular, Real-time Policy Enforcement and User Coaching Beyond visibility and analytics, Netskope also provides the ability to enforce granular policies within Google Apps, across its ecosystem, and in other cloud apps. This means that rather than take a blunt-force block/allow approach to apps, IT can direct or shape usage by controlling very granular actions or contextual details, for example, Don t let users in insiders share confidential documents with people outside of the company, Alert me if users download content from Google Docs or Google Drive while on a mobile device, or Coach users that upload content to any cloud storage app other than Google Drive. Beyond visibility and analytics, Netskope also provides the ability to enforce granular policies within Google Apps, across its ecosystem, and in other cloud apps. With Netskope, you can create sophisticated, precise policies in a few clicks on any contextual detail or activity within an app, app instance, or across a category, and enforce those policies in real time. This means you can block, alert, encrypt, and coach across any app in the Google Apps suite (or any app). You can set policies for activities such as create, delete, download, edit, post, export, share, and even login or contextual details such as location, device, browser, etc. Netskope also has integrations with your enterprise Microsoft Active Directory and popular cloud single sign-on solutions. This means that any activity- and data-level policy enforcement will be in the context of users, their roles, and the groups they belong to, and you can use SSO to detect and enforce Netskope in the case of remote access. You can also use Netskope to detect new cloud apps, including ones in the Google ecosystem, that should be covered by SSO. By providing granular activity- and data-level controls in context, we enable three important use cases for enterprise IT. These include blocking risky behaviors without blocking apps, protecting sensitive content moving to or discovered in the cloud, and coaching users for standardization and transparency. Block Risky Behaviors Up until now, the only way IT could deal with risky or unsanctioned cloud apps was to block them entirely. This caused a great deal of difficulty, with a raft of requested exceptions and users going to great lengths to go around the system, often for legitimate business purposes. Even when your organization standardizes on Google Apps, blocking unsanctioned apps may not be your best route. Why not block the risky behavior instead? Say your users have partners that send them contracts, specs, and presentations as a link from a different cloud storage app than Google Drive. Should you block that app so they can t get to those documents? How about blocking them from uploading your content to any app except Google Drive, while still letting them view or download from other apps from which partners share their content? Netskope can let you enforce this policy in a few clicks. 4

Protect Sensitive Content Beyond discovering sensitive content as it s being uploaded to, downloaded from, or resident within Google Apps, Netskope lets you take action such as prevent the upload of or encrypt content if it matches a predefined or custom DLP profile such as PII, PHI, PCI or confidential. In the case of content discovered in one of the Google apps, we let you take action such as restrict access, change ownership, download files for review, secure content with strong encryption, and notify content owners. For content encryption, Netskope offers 256-bit encryption and cloud-based, fault tolerant FIPS 140-2 Level 3 certified cloud-based key management with an optional hardware security module (HSM). We also integrate with on-premises, KMIP-compliant key management solutions. Beyond discovering sensitive content as it s being uploaded to, downloaded from, or resident within Google Apps, Netskope lets you take action such as prevent the upload of or encrypt content if it matches a predefined or custom DLP profile such as PII, PHI, PCI or confidential. Similar to the use case above, for apps that are outside of the Google Apps suite, you can also enforce granular, activity-level content controls. For example, if your policy is to allow upload of confidential documents only to Google Drive, you can detect and block the activity, and then redirect the user to Google Drive. Coach Users When you enforce policies with Netskope, it s always a good idea to coach users. That can mean simply letting them know that you ve blocked them from an activity because it s against policy. But even more useful is to give them an alternative, such as blocking them from uploading content to an unsanctioned app, and then coaching them with a URL (or simply redirecting them) to sign up for Google Drive. You may also want to give them a little more say in the matter. For example, if you enforce a policy blocking users from sharing content outside of the company, but then give them a rip-cord to do the activity anyway, you can configure Netskope to let them continue and simply enter a short justification so you can report on it for compliance later on. Similarly, you can provide the opportunity for the user to indicate that the detected activity is a false positive, and let them continue. This gives them more control and lets you gather user feedback, making your detection and policy enforcement stronger. 5

Netskope Enables These Key Use Cases FEATURE BENEFIT Discover all Google Apps running in your organization; consolidate instances or redundant apps Save cost and reduce complexity and risk Get visibility and control consistently across Google Apps and the apps that share or access the same data Conduct forensic analysis across your Google Apps suite Quickly confirm and report on suspicious or non-compliant activity Don t guess; prove data exposure so you can take action Detect cloud anomalies Be alerted to anomalous behavior that could signal compromised credentials, out-ofcompliance behaviors, and even the presence of malware e-discover sensitive content and take action based on risk and compliance requirements Block risky activities in cloud apps, e.g., sharing outside of the company Know what sensitive content is in your cloud through introspection Triage your remediation Say yes to cloud apps while mitigating risk through precise, not coarse-grained, control Protect sensitive content Get control over your sensitive data residing in cloud apps Prevent the loss or exposure of sensitive data Coach Users Shape behavior through education Create transparency about policy and rationale Give users some control and a say in the process Summary As your organization adopts and standardizes on the Google Apps suite, you need granular visibility and activity- and data-level controls across the entire suite, the ecosystem, and even other cloud apps in your environment. You need to coach users in order to shape usage and create transparency, and you need to report on activities and events for compliance purposes. Netskope helps you do that in a consistent, one-stop fashion, enabling you to safely adopt Google Apps and its ecosystem of useful productivity and collaboration apps. About Netskope Netskope is the leader in safe cloud enablement. The Netskope Active Platform gives IT the ability to find, understand, and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data, and ensure compliance in real-time, on any device, for any cloud app so the business can move fast, with confidence. Netskope serves a broad customer base including leading healthcare, financial services, high technology, and retail enterprises, and has been named to CIO Magazine s top 10 cloud security startups and a Gartner Cool Vendor. Share This Paper 2015 Netskope, Inc. All rights reserved. Netskope is a registered trademark and Netskope Active, Netskope Discovery, Cloud Confidence Index, and SkopeSights are trademarks of Netskope, Inc. All other trademarks are trademarks of their respective owners. 12/14 SB-42-2