Netskope is recognized as a Leader again in the Gartner® Magic Quadrant™ for SASE Platforms. Get the Report

close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
          Experience Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            Netskope is recognized as a Leader Furthest in Vision for both SSE and SASE Platforms
            2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
            One unified platform built for your journey
              Securing Generative AI for Dummies
              Securing Generative AI for Dummies
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Modern Data Loss Prevention (DLP) for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modern SD-WAN for SASE Dummies Book
                  Modern SD-WAN for SASE Dummies
                  Stop playing catch up with your networking architecture
                    Understanding where the risk lies
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Netskope Technical Support
                        Netskope Technical Support
                        Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
                          Netskope video
                          Netskope Training
                          Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

                            Mind the Gap – Cloud Threat & Data Protection

                            Apr 09 2020

                            Increased remote working each day is accelerating the digital transformation of cloud services and apps across the globe.  Workforces now at home will innovate, adapt, and adopt new cloud services and apps, where over 98% are not managed by IT administration. This opens the door for data to move like a river throughout the cloud and introduces new threats where all stages of the cyber kill chain are cloud-enabled. Cloud phishing will only increase in these times, alongside compromising credentials to enable attackers the ability to log in.

                            Stabilizing, optimizing, and securing remote worker access with Zero Trust Network Access (ZTNA) solutions like Netskope Private Access combined with a Netskope Next Gen Secure Web Gateway (NG SWG), are actions being taken now.  Next comes the assessment of cloud data and threat protection defenses used by your organization. To get a picture across various industries and organization sizes, we coordinated with Cyber Security Insiders (CSI) to conduct a survey on the current state of cloud defenses.

                            What are the disruptors to drive an assessment of cloud defenses?

                            1. The average organization uses 2,415 cloud services and apps today
                            2. 89% of users are active in the cloud, even more so when working remotely
                            3. The #1 attack method is phishing, and the #1 target is SaaS/webmail 
                            4. The apps with the most threats are: Office 365 OneDrive, Box, G Drive
                            5. SaaS enables threats with trusted domains and valid certificates to evade legacy defenses
                            6. Allow listing cloud apps provides a red carpet entry for threats and data exfiltration
                            7. 44% of threats were cloud-enabled in 2019 with a span over 1600+ cloud services and apps
                            8. Published attacks are heavily using cloud services within the delivery and exploit kill chain stages
                            9. For the first time, 51% of threats are now file-less while 49% are malware-based
                            10. More than 50% of web traffic sessions are cloud-based requiring inline API JSON decoding

                            Solid evidence it’s time to mind the gap and assess cloud threat and data protection today and in the future to benchmark progress. Cloud adoption also brings boundary crossings that legacy defenses miss due to either a lack of visibility or coarse grain allow/block controls with no understanding of context.  Data can flow between company and personal instances of cloud apps, between managed and unmanaged cloud apps, and between low-risk and high-risk cloud apps not desired for use. Beyond instance awareness, is an understanding of activity and its anomalies, plus the content itself and the overall context. All of this requires the inline decoding of cloud-based API JSON traffic for thousands of cloud services and apps in use today.

                            The results are interesting, almost two-thirds of enterprises surveyed are not prepared for widespread cloud use for threat and data protection. For those attending the webinar on April 30th at 2pm EST, we will provide an infographic covering the key highlights of the survey, plus a full report that dives deeper into the demographics and correlations between questions To understand where you stand among peers when it comes to enabling cloud defenses, please attend the webinar at the registration link below.

                            ATTEND THE WEBINAR

                            After the webinar on April 30th at 2pm EST, we will provide the INFOGRAPHIC and the FULL REPORT on these hyperlinks. 

                            Resources:

                            • 2020 Netskope Cloud and Threat Report
                            • 2020-2019 Netskope Threat Research Blogs
                            • 2020 CrowdStrike Threat Report
                            • 2019 Quarterly APWG Phishing Trends Report 
                            author image
                            Tom Clare
                            Tom Clare is a Product Marketing Director, his focus at Netskope centers on product strategy with marketing experience in web/cloud proxies, data protection, and more.
                            Tom Clare is a Product Marketing Director, his focus at Netskope centers on product strategy with marketing experience in web/cloud proxies, data protection, and more.
                            Connect with Netskope

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.