Netskope named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge. Get the report

close
close
  • Why Netskope chevron

    Changing the way networking and security work together.

  • Our Customers chevron

    Netskope serves more than 3,000 customers worldwide including more than 25 of the Fortune 100

  • Our Partners chevron

    We partner with security leaders to help you secure your journey to the cloud.

Still Highest in Execution.
Still Furthest in Vision.

Learn why 2024 Gartner® Magic Quadrant™ named Netskope a Leader for Security Service Edge the third consecutive year.

Get the report
Netskope Named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge graphic for menu
We help our customers to be Ready for Anything

See our customers
Woman smiling with glasses looking out window
Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn about Netskope Partners
Group of diverse young professionals smiling
Your Network of Tomorrow

Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.

Get the white paper
Your Network of Tomorrow
Introducing the Netskope One Platform

Netskope One is a cloud-native platform that offers converged security and networking services to enable your SASE and zero trust transformation.

Learn about Netskope One
Abstract with blue lighting
Embrace a Secure Access Service Edge (SASE) architecture

Netskope NewEdge is the world’s largest, highest-performing security private cloud and provides customers with unparalleled service coverage, performance and resilience.

Learn about NewEdge
NewEdge
Netskope Cloud Exchange

The Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.

Learn about Cloud Exchange
Netskope video
The platform of the future is Netskope

Intelligent Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG), and Private Access for ZTNA built natively into a single solution to help every business on its journey to Secure Access Service Edge (SASE) architecture.

Go to Products Overview
Netskope video
Next Gen SASE Branch is hybrid — connected, secured, and automated

Netskope Next Gen SASE Branch converges Context-Aware SASE Fabric, Zero-Trust Hybrid Security, and SkopeAI-powered Cloud Orchestrator into a unified cloud offering, ushering in a fully modernized branch experience for the borderless enterprise.

Learn about Next Gen SASE Branch
People at the open space office
Designing a SASE Architecture For Dummies

Get your complimentary copy of the only guide to SASE design you’ll ever need.

Get the eBook
Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn about NewEdge
Lighted highway through mountainside switchbacks
Safely enable the use of generative AI applications with application access control, real-time user coaching, and best-in-class data protection.

Learn how we secure generative AI use
Safely Enable ChatGPT and Generative AI
Zero trust solutions for SSE and SASE deployments

Learn about Zero Trust
Boat driving through open sea
Netskope achieves FedRAMP High Authorization

Choose Netskope GovCloud to accelerate your agency’s transformation.

Learn about Netskope GovCloud
Netskope GovCloud
  • Resources chevron

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog chevron

    Learn how Netskope enables security and networking transformation through security service edge (SSE)

  • Events and Workshops chevron

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined chevron

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

How to Use a Magic Quadrant and Other Industry Research
In this episode Max Havey, Steve Riley and Mona Faulkner dissect the intricate process of creating a Magic Quadrant and why it's much more than just a chart.

Play the podcast
How to Use a Magic Quadrant and Other Industry Research podcast
Latest Blogs

Read how Netskope can enable the Zero Trust and SASE journey through security service edge (SSE) capabilities.

Read the blog
Sunrise and cloudy sky
SASE Week 2023: Your SASE journey starts now!

Replay sessions from the fourth annual SASE Week.

Explore sessions
SASE Week 2023
What is Security Service Edge?

Explore the security side of SASE, the future of network and protection in the cloud.

Learn about Security Service Edge
Four-way roundabout
  • Company chevron

    We help you stay ahead of cloud, data, and network security challenges.

  • Leadership chevron

    Our leadership team is fiercely committed to doing everything it takes to make our customers successful.

  • Customer Solutions chevron

    We are here for you and with you every step of the way, ensuring your success with Netskope.

  • Training and Certification chevron

    Netskope training will help you become a cloud security expert.

Supporting sustainability through data security

Netskope is proud to participate in Vision 2045: an initiative aimed to raise awareness on private industry’s role in sustainability.

Find out more
Supporting Sustainability Through Data Security
Thinkers, builders, dreamers, innovators. Together, we deliver cutting-edge cloud security solutions to help our customers protect their data and people.

Meet our team
Group of hikers scaling a snowy mountain
Netskope’s talented and experienced Professional Services team provides a prescriptive approach to your successful implementation.

Learn about Professional Services
Netskope Professional Services
Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn about Training and Certifications
Group of young professionals working

Break Up the IT Block Party: Facilitating Healthcare Collaboration

Aug 31 2021

Healthcare organizations still seem to think that blocking all access to unapproved cloud storage or cloud collaboration tools means that they’re preventing leakage of sensitive information. But as the old saying goes, “Data flows like water.” Eventually, it’s going to find the holes and escape. 

Even if a healthcare IT system has water-tight data controls, that’s not the only goal within the organization—and not even the most important one. When blocking prevents a clinician from doing their job to the best of their abilities, data is especially hard to contain.

The need for more, and better, collaboration in healthcare 

Today, a lot of health organizations are working to become more collaborative across doctors and teams to improve the quality of care and improve outcomes for patients. If I were a patient undergoing treatment, I would want to make sure that my primary care physician, my specialists, and all the different services and facilities involved across the medical treatment ecosystem would have access to all the necessary information to help resolve my illness. In fact, that’s one of the main transformative benefits that digital tools have brought to medicine in recent years.

Patients expect that all the different care providers they need are working together to solve their health problems. But the whole idea of blocking data sharing as a default institutional policy limits the ability for healthcare providers to operate as a nimble, coordinated unit. In order to collaborate, sensitive patient data needs to be shared—across departments and oftentimes outside the institution. And this kind of sharing has historically been a problem for healthcare security. Security teams tend to block first and ask questions later.

Managing data risks shouldn’t be all or nothing

Why would we want to prevent sharing of patient information among the people who need to use it? Blocking collaboration tools or access to data sources outside the organization’s control might limit the risk of data loss, but it also sets us back in the core objective of treating patients with the best available resources.

Here’s a good example. Let’s say the only managed cloud application for collaboration at our hospital is Microsoft OneDrive. The hospital’s security team blocks access to all other services (e.g., Dropbox, Google Drive, Box) to ensure that private patient data/PII can’t be exfiltrated via those tools. But what if a doctor is collaborating with a major research university on a specialized course of treatment, and that institution only allows access via Dropbox? 

So, now we have a problem. Rigid data blocking policies are hampering cross-institutional collaboration and the best treatment for a patient, whether the data in question contains sensitive information or not. Maybe it’s just communications back and forth between the hospital and the university. Shouldn’t they be automatically allowed to collaborate across different cloud platforms under benign circumstances, rather than wasting time for one side or the other to request and wait for an approved exception from IT/security?

In this case, the hospital says that clinicians can’t go to Dropbox and the university says researchers can’t go OneDrive because of overly rigid data policies. And rigid systems break—doctors who are committed to patient care will find workarounds—via Shadow IT, where data may be moving outside the institution anyway. We need to stop blocking everything for the sake of transparent, collaborative patient care. The only way we can do this is to allow providers to do the things that they need to do.

 “Allow” is the new “block”

Modern healthcare organizations can start down the path of facilitating cooperative care by first gaining visibility into the data and the users who are seeking access to the cloud and collaboration tools. Once we have visibility, then we can apply granular controls around what users can and can’t do based on the content of the file and based on the action that they’re trying to make. 

Back to the previous example of the hospital working with the research university. We can apply a group policy that allows our hospital clinicians to go to the university’s Dropbox account to view or download shared research findings, but the policy may block them from being able to upload anything. Or we can take it a step further and say our clinicians can also upload files—unless they contain protected health information (PHI) or personally identifiable information (PII) data. If that attempt is made, security controls would automatically block the user from being able to send out these specific files.

By establishing visibility and implementing policy-based granular controls, the organization can move forward with transparent collaboration—whereas before, the universal block policy left everyone at a standstill.

The challenge of multiple user instances

Another thing that many hospitals don’t realize is that by allowing their users to go to Office 365 or Google Workspace, those users could potentially be going to another instance of those cloud applications. 

To use another common example, let’s say you’re a doctor on contract with a local hospital, but you also have your own private practice. You may come in and access your hospital-sanctioned instance of Office 365—but one day, you also need access to your private practice Office 365 instance to check on something else. By allowing users into Office 365 as a default policy, the hospital very often isn’t able to see which instance you’re actually accessing. You could be connecting to reference test results for an outside patient, or you could be uploading patient PII. The hospital may not be able to see enough to know what’s actually transpiring—let alone do anything to control it.

So how can hospitals gain visibility to discern a doctor’s private Office 365 instance from one that’s managed to use within the hospital? They need security with instance-aware visibility and granular controls. Policies can be set so that a contractor can come into the hospital, view their private instances for reference, but they can’t upload anything. Or maybe just not anything that contains sensitive or private information. 

Security that enables this kind of adaptive trust is what healthcare needs to embrace in order to make flexible collaboration and appropriate information sharing possible—without introducing undue risks to patients or institutions.

The block party is over: Secure collaboration starts today

It’s important to remember, data flows like water—it will find any available gap to escape. Clinicians will find ways to bypass any security controls that appear to get in the way of their primary objective—providing patients with the best possible care and saving lives.

Security for healthcare now needs to focus on visibility and control so conversations can shift from just a standard “no”  into policies that mitigate risks without inhibiting teamwork. Ten years from now, healthcare CISOs are going to look back and say, “Remember when we used to just block everything?” To serve patients and save lives, that evolution needs to start today. And fortunately, there are already security solutions for transparent visibility and granular control available to help make it possible.

This article was originally published at Healthcare IT Today

author image
Damian Chung
Damian Chung is a cybersecurity leader with over ten years of security experience focused in healthcare. As the Business Information Security Officer at Netskope, Damian is responsible for overseeing corporate security tools and processes and acts as the subject matter expert in the healthcare vertical. He also serves as an adjunct professor for the cybersecurity program at the University of Advancing Technologies in Tempe, AZ.

Stay informed!

Subscribe for the latest from the Netskope Blog