close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
          Experience Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            Netskope debuts as a Leader in the Gartner® Magic Quadrant™ for Single-Vendor SASE
              Securing Generative AI for Dummies
              Securing Generative AI for Dummies
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Modern Data Loss Prevention (DLP) for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modern SD-WAN for SASE Dummies Book
                  Modern SD-WAN for SASE Dummies
                  Stop playing catch up with your networking architecture
                    Understanding where the risk lies
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                            Netskope GovCloud
                            Netskope achieves FedRAMP High Authorization
                            Choose Netskope GovCloud to accelerate your agency’s transformation.
                              Let's Do Great Things Together
                              Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskope Technical Support
                                  Netskope Technical Support
                                  Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
                                    Netskope video
                                    Netskope Training
                                    Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

                                      Top 6 Questions to Ask Your Cloud DLP Vendor: Protecting Sensitive Data

                                      Dec 19 2018
                                      Tags
                                      CASB
                                      Cloud Access Security Broker
                                      Data Loss Prevention Software
                                      DLP
                                      sensitive data
                                      Tools and Tips

                                      We’ve written an ebook of considerations when choosing a cloud DLP vendor to protect sensitive data in the various cloud services that your employees use. We’ll go over the first consideration in this blog post.

                                      There are many ways for sensitive data to leak into the cloud, outside of the purview of security teams. With employees accessing cloud services from various devices (managed and unmanaged), networks, and locations, it’s hard for security teams to gain the visibility and control needed to detect sensitive content like PII, PHI, PCI, confidential documents, and more. One consideration organizations need to think about when choosing a cloud DLP vendor is whether that vendor can secure all methods in which sensitive data can leak in the cloud – whether that’s from unmanaged devices, off-premises locations, unsanctioned/shadow IT cloud services, and more.

                                      Question 1: Can I cover all the ways sensitive data can leak?

                                      Over 50% of all cloud traffic comes from mobile devices. Workforces are distributed and access cloud services from various locations and networks. You need to be able to enforce your policies wherever your users are and whatever their device or method of access.

                                      What to look for: Pick a cloud security platform with comprehensive monitoring and control at the activity and content level, whether users are on-premises or remote, on a mobile device or even using mobile apps or sync clients. Make sure your team can differentiate your policy enforcement between managed (corporate) and unmanaged (personally-owned) devices. Ensure the solution covers all possible cloud traffic regardless of location, device, or network.

                                      Test for it: Test for it in your CASB by triggering a DLP policy in a native sync client. Confirm the policy enforcement and look for a coaching message to the user offering an alternative to the violated policy. Also, verify two policies that have the same triggers but different actions based on device ownership.

                                      For the full ebook, go here.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog