Netskope named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge. Get the report

close
close
  • Why Netskope chevron

    Changing the way networking and security work together.

  • Our Customers chevron

    Netskope serves more than 3,000 customers worldwide including more than 25 of the Fortune 100

  • Our Partners chevron

    We partner with security leaders to help you secure your journey to the cloud.

Still Highest in Execution.
Still Furthest in Vision.

Learn why 2024 Gartner® Magic Quadrant™ named Netskope a Leader for Security Service Edge the third consecutive year.

Get the report
Netskope Named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge graphic for menu
We help our customers to be Ready for Anything

See our customers
Woman smiling with glasses looking out window
Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn about Netskope Partners
Group of diverse young professionals smiling
Your Network of Tomorrow

Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.

Get the white paper
Your Network of Tomorrow
Introducing the Netskope One Platform

Netskope One is a cloud-native platform that offers converged security and networking services to enable your SASE and zero trust transformation.

Learn about Netskope One
Abstract with blue lighting
Embrace a Secure Access Service Edge (SASE) architecture

Netskope NewEdge is the world’s largest, highest-performing security private cloud and provides customers with unparalleled service coverage, performance and resilience.

Learn about NewEdge
NewEdge
Netskope Cloud Exchange

The Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.

Learn about Cloud Exchange
Netskope video
The platform of the future is Netskope

Intelligent Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG), and Private Access for ZTNA built natively into a single solution to help every business on its journey to Secure Access Service Edge (SASE) architecture.

Go to Products Overview
Netskope video
Next Gen SASE Branch is hybrid — connected, secured, and automated

Netskope Next Gen SASE Branch converges Context-Aware SASE Fabric, Zero-Trust Hybrid Security, and SkopeAI-powered Cloud Orchestrator into a unified cloud offering, ushering in a fully modernized branch experience for the borderless enterprise.

Learn about Next Gen SASE Branch
People at the open space office
Designing a SASE Architecture For Dummies

Get your complimentary copy of the only guide to SASE design you’ll ever need.

Get the eBook
Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn about NewEdge
Lighted highway through mountainside switchbacks
Safely enable the use of generative AI applications with application access control, real-time user coaching, and best-in-class data protection.

Learn how we secure generative AI use
Safely Enable ChatGPT and Generative AI
Zero trust solutions for SSE and SASE deployments

Learn about Zero Trust
Boat driving through open sea
Netskope achieves FedRAMP High Authorization

Choose Netskope GovCloud to accelerate your agency’s transformation.

Learn about Netskope GovCloud
Netskope GovCloud
  • Resources chevron

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog chevron

    Learn how Netskope enables security and networking transformation through security service edge (SSE)

  • Events and Workshops chevron

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined chevron

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

The Intersection of Zero Trust and National Security
On the latest episode of Security Visionaries, co-hosts Max Havey and Emily Wearmouth sit down for a conversation with guest Chase Cunningham (AKA Dr. Zero Trust) about zero trust and national security.

Play the podcast
The Intersection of Zero Trust and National Security
Latest Blogs

Read how Netskope can enable the Zero Trust and SASE journey through security service edge (SSE) capabilities.

Read the blog
Sunrise and cloudy sky
SASE Week 2023: Your SASE journey starts now!

Replay sessions from the fourth annual SASE Week.

Explore sessions
SASE Week 2023
What is SASE?

Learn about the future convergence of networking and security tools in today’s cloud dominant business model.

Learn about SASE
  • Company chevron

    We help you stay ahead of cloud, data, and network security challenges.

  • Leadership chevron

    Our leadership team is fiercely committed to doing everything it takes to make our customers successful.

  • Customer Solutions chevron

    We are here for you and with you every step of the way, ensuring your success with Netskope.

  • Training and Certification chevron

    Netskope training will help you become a cloud security expert.

Supporting sustainability through data security

Netskope is proud to participate in Vision 2045: an initiative aimed to raise awareness on private industry’s role in sustainability.

Find out more
Supporting Sustainability Through Data Security
Thinkers, builders, dreamers, innovators. Together, we deliver cutting-edge cloud security solutions to help our customers protect their data and people.

Meet our team
Group of hikers scaling a snowy mountain
Netskope’s talented and experienced Professional Services team provides a prescriptive approach to your successful implementation.

Learn about Professional Services
Netskope Professional Services
Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn about Training and Certifications
Group of young professionals working

Achieving true Zero Trust model compliance in today’s “cloudy” world

Dec 10 2018
Tags
bring your own device
BYOD
CASB
CCI
netskope cloud confidence index
zero trust
zero trust security model

The Zero Trust security concept is getting ready to celebrate its 10th anniversary next year. First introduced and formalized in 2009 by Forrester analyst John Kingervag, it became quite a paradigm shift for security practitioners worldwide by declaring all users, regardless whether they were internal or external, as untrusted by default. Its introduction was quite timely, as enterprises large and small were dealing with challenges of expanding work-from-home initiatives and consumerization of IT, largely due to Apple’s amazing success with the iPhone as BYOD device that was quickly displacing Blackberry, as well as growing popularity of Macs, which were typically not on the list of corporate-procured compute devices. The growth of remote access solutions was also expanding, with SSL VPN approach dominating and overshadowing inconveniences of the traditional stalwart of the IPSEC variants, and users were trying to “attack” the entrance to the corporate applications from all angles.

However, while traditionally that shiny new Mac or iPhone was gated by a VPN device for occasional external access to internally-hosted applications, the rapidly expanding BYOD wave meant that those employee-owned devices ended up within the company perimeter, on a company Wi-Fi (or even wired access), attenuating the traditional “castle and the moat” defense perimeter that enterprises have built over years. The Zero Trust model called for not only distrusting any user as the insider based on their network location, but also taking into account their identity, endpoint posture, and least privilege concept in granting access to the application.

So, what does it take to implement this model in today’s “cloudy” world? For starters, we often hear about the Zero Trust concept from the Identity and Access Management vendors. However, many vendors that own the user identity don’t own the access path to the applications. Companies like Okta, Microsoft, Duo, Centrify, and Ping focus on providing as much context as possible about the user and their endpoint in order to achieve most relevant scope for authentication and authorization to comply with the Zero Trust access concept. That comprises the first key pillar to achieving compliance with Zero Trust model.  A second key pillar of the Zero Trust model envisions a network segmentation gateway. In the words of Kindervag, its “like firewall or UTM on steroids. It does firewall, IPS, DLP, content filtering, and encryption with a 10G interface that separates the switching fabric of each function.”

Kindervag now works for Palo Alto Networks, who, as a leader in the Next-Generation Firewall market, embraced and capitalized on the Zero Trust security model both in its marketing and practical approach of providing customers with both application awareness (app-id) and user awareness (user-id) as part of crafting real-time access policies on the network. While not covering all aspects of Zero Trust Network Segmentation Gateway, Palo Alto products deliver on most of the requirements that Kindervag outlined in his implementation strategy – firewall, IPS, content filtering to some extent, and encryption/decryption capabilities.

There is only one small problem with operationalizing the Zero Trust security model with Next-Generation Firewalls in today’s world – the applications that it aims to protect are no longer in its direct span of control.  Additionally, Next-Generation firewalls lack granular application action awareness on Layer 7 and is not able to discern various actions that security administrator may want to govern for their user population. The traditional HTTP/HTTPS traffic that these firewalls inspect does not include the API layer of communications that make cloud services so dynamic and complex. Without this additional contextual information and visibility, security administrators are unable to place controls over these API communications.

Google was one of the first large enterprises that ditched the traditional perimeter of the datacenters and moved their entire application workloads to the cloud by implementing what they called the BeyondCorp concept.  BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from any location without the need for a traditional VPN.

Microsoft has also recently taken a full charge into supporting the Zero Trust concept, outlining a comprehensive approach to building Zero Trust environments using Microsoft technologies. Both Microsoft and Google’s approaches cater to the use cases where companies are either migrating their existing on-premises workloads to the cloud (the lift and shift approach), or are deploying new cloud-native applications that are custom-built.  That is not, however, how the majority of enterprises are transforming their application usage today. With the rapid growth of Shadow IT, various business units and even individual end-users consume a large variety of SaaS applications and cloud services. As a matter of fact, the latest Netskope Cloud Report shows that there is an average of 1,246 cloud services in use per enterprise – and that number does not include any of the custom-developed apps or services hosted by the enterprise in the IaaS clouds.

While Palo Alto pioneered the App-Id technology, its Applipedia database contains only 2,707 applications as of the moment of this writing. That is just under 10% of what Netskope Cloud Confidence Index database has in its rapidly-growing list of cloud applications.

A core tenet of the Zero Trust security model is to log and inspect all traffic that goes between users and the applications they access. And with applications rapidly moving outside of the corporate datacenter perimeter and users being mobile and accessing these applications from any device no matter where they are, it becomes very apparent that a true Zero Trust security model compliance cannot be achieved today without providing a way to inspect the traffic between users and SaaS and IaaS-based application workloads they access.

That is exactly where a CASB such as Netskope comes up to fill the gap in the cloud-focused application world.  With the unprecedented variety of traffic steering mechanism, ranging from on-premises clientless steering appliances and integrations with existing traffic management and security devices, to endpoint lightweight client and mobile VPN profiles, and finally the reverse proxy for unmanaged device access, Netskope offers the most comprehensive modern-day alternative to the original Network Segmentation Gateway concept that is so pivotal to the effectiveness and the success of the Zero Trust model. It provides full inline visibility into both sanctioned and unsanctioned cloud applications and services that are used in the enterprise, as well as any custom applications deployed by customers in the cloud, and it allows enterprises to fully implement the Zero Trust security model by bringing in comprehensive monitoring, access control, and data protection for their SaaS and IaaS applications.

author image
Michael Koyfman
Michael Koyfman is the Head of Global Solution Architecture at Netskope.

Stay informed!

Subscribe for the latest from the Netskope Blog