Netskope is recognized as a Leader again in the Gartner® Magic Quadrant™ for SASE Platforms. Get the Report

close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
Experience Netskope
Get Hands-on With the Netskope Platform
Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
A Leader in SSE. Now a Leader in Single-Vendor SASE.
Netskope is recognized as a Leader Furthest in Vision for both SSE and SASE Platforms
2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
One unified platform built for your journey
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
Modern data loss prevention (DLP) for Dummies eBook
Modern Data Loss Prevention (DLP) for Dummies
Get tips and tricks for transitioning to a cloud-delivered DLP.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Stop playing catch up with your networking architecture
Understanding where the risk lies
Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
Netskope Technical Support
Netskope Technical Support
Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
Netskope video
Netskope Training
Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

The Most Critical CASB Use Cases in the Market Today: Monitor or control users’ activities even when they are accessing cloud services from a mobile app or desktop native app

Nov 10 2016
Tags
CASB
Cloud Best Practices
Cloud Security
Tools and Tips

Enterprises’ cloud security use cases are maturing, and they are seeking a cloud access security broker (CASB) to help them move from log-based discovery to enforcing more sophisticated policy or at least monitoring usage more deeply.

Netskope customers have deployed Netskope’s ALL-MODE architecture (with more than three-quarters of them going beyond a single mode) to achieve their most critical use cases. We have noted 15 of these use cases in our recent e-book, The 15 Critical CASB Use Cases, and we’re highlighting them and more (and we want to hear from you too!) in this blog.  

Here’s use case #3: Monitor or control users’ activities even when they are accessing cloud services from a mobile app or desktop native app.

Enterprise security around mobile and remote access is a funny thing. On the one hand, IT knows that nearly all employees access corporate applications from remote and mobile locations, yet few of them actually have adequate security controls in place around this access pattern. According to a study we did last year, more than half of all cloud activities (send, share, view, edit, approve, etc.) happen over a mobile device (imagine how much you accomplish on your phone when you’re standing in line at the grocery store!), and a full one-third of DLP violations happen on mobile.

One critical difference between Netskope and other CASBs is that we enable the use case of monitoring activity and enforcing policy controls over sanctioned and unsanctioned cloud services EVEN when users are accessing the service from a mobile app or desktop native app. Consider a policy that you may have in place that states: “During our company’s financial quiet period, we prefer that corporate ‘insiders’ do not share content outside of the company from any Cloud Storage application” (you may even stipulate that if they do, they need to write a short business justification for later audit purposes). If you do not have controls in place over remote and mobile access, then it would be very easy for users to bypass your policy. However, Netskope customers are able to enforce this kind of policy, and often do so in order to ensure thorough policy controls over nonpublic financial information, intellectual property, and sensitive or regulated user or customer data.  

To support this use case, the enterprise must deploy in an inline, forward proxy mode with or without an agent on-premises and with a thin agent on any remote or mobile device that is off-network (note that there is a small set of use cases for which a reverse proxy will work for browser-based access of a sanctioned app, and we support this access pattern too!). Here are five critical functional requirements that are also needed to achieve this use case:

  • Be aware of context, e.g., activities such as “share” or “download”
  • Inspect and control cloud traffic even when it originates from a mobile app or desktop native app
  • See and control usage in both sanctioned and unsanctioned services
  • Enforce policy action such as block, coach, or justify in real time
  • Decode the cloud service API to understand the transaction (for forward proxy)

How are you enforcing controls in mobile and remote situations in sanctioned and unsanctioned cloud services? We want to hear from you.

Learn more about this and 14 additional most impactful use cases by downloading The 15 Critical CASB Use Cases.

Connect with Netskope

Subscribe to the Netskope Blog

Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.