Netskope named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge. Get the report

  • Why Netskope chevron

    Changing the way networking and security work together.

  • Our Customers chevron

    Netskope serves more than 3,000 customers worldwide including more than 25 of the Fortune 100

  • Our Partners chevron

    We partner with security leaders to help you secure your journey to the cloud.

Still Highest in Execution.
Still Furthest in Vision.

Learn why 2024 Gartner® Magic Quadrant™ named Netskope a Leader for Security Service Edge the third consecutive year.

Get the report
Netskope Named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Service Edge graphic for menu
We help our customers to be Ready for Anything

See our customers
Woman smiling with glasses looking out window
Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn about Netskope Partners
Group of diverse young professionals smiling
Your Network of Tomorrow

Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.

Get the white paper
Your Network of Tomorrow
Introducing the Netskope One Platform

Netskope One is a cloud-native platform that offers converged security and networking services to enable your SASE and zero trust transformation.

Learn about Netskope One
Abstract with blue lighting
Embrace a Secure Access Service Edge (SASE) architecture

Netskope NewEdge is the world’s largest, highest-performing security private cloud and provides customers with unparalleled service coverage, performance and resilience.

Learn about NewEdge
Netskope Cloud Exchange

The Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.

Learn about Cloud Exchange
Netskope video
The platform of the future is Netskope

Intelligent Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG), and Private Access for ZTNA built natively into a single solution to help every business on its journey to Secure Access Service Edge (SASE) architecture.

Go to Products Overview
Netskope video
Next Gen SASE Branch is hybrid — connected, secured, and automated

Netskope Next Gen SASE Branch converges Context-Aware SASE Fabric, Zero-Trust Hybrid Security, and SkopeAI-powered Cloud Orchestrator into a unified cloud offering, ushering in a fully modernized branch experience for the borderless enterprise.

Learn about Next Gen SASE Branch
People at the open space office
Designing a SASE Architecture For Dummies

Get your complimentary copy of the only guide to SASE design you’ll ever need.

Get the eBook
Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn about NewEdge
Lighted highway through mountainside switchbacks
Safely enable the use of generative AI applications with application access control, real-time user coaching, and best-in-class data protection.

Learn how we secure generative AI use
Safely Enable ChatGPT and Generative AI
Zero trust solutions for SSE and SASE deployments

Learn about Zero Trust
Boat driving through open sea
Netskope achieves FedRAMP High Authorization

Choose Netskope GovCloud to accelerate your agency’s transformation.

Learn about Netskope GovCloud
Netskope GovCloud
  • Resources chevron

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog chevron

    Learn how Netskope enables security and networking transformation through security service edge (SSE)

  • Events and Workshops chevron

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined chevron

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

The Intersection of Zero Trust and National Security
On the latest episode of Security Visionaries, co-hosts Max Havey and Emily Wearmouth sit down for a conversation with guest Chase Cunningham (AKA Dr. Zero Trust) about zero trust and national security.

Play the podcast
The Intersection of Zero Trust and National Security
Latest Blogs

Read how Netskope can enable the Zero Trust and SASE journey through security service edge (SSE) capabilities.

Read the blog
Sunrise and cloudy sky
SASE Week 2023: Your SASE journey starts now!

Replay sessions from the fourth annual SASE Week.

Explore sessions
SASE Week 2023
What is SASE?

Learn about the future convergence of networking and security tools in today’s cloud dominant business model.

Learn about SASE
  • Company chevron

    We help you stay ahead of cloud, data, and network security challenges.

  • Leadership chevron

    Our leadership team is fiercely committed to doing everything it takes to make our customers successful.

  • Customer Solutions chevron

    We are here for you and with you every step of the way, ensuring your success with Netskope.

  • Training and Certification chevron

    Netskope training will help you become a cloud security expert.

Supporting sustainability through data security

Netskope is proud to participate in Vision 2045: an initiative aimed to raise awareness on private industry’s role in sustainability.

Find out more
Supporting Sustainability Through Data Security
Thinkers, builders, dreamers, innovators. Together, we deliver cutting-edge cloud security solutions to help our customers protect their data and people.

Meet our team
Group of hikers scaling a snowy mountain
Netskope’s talented and experienced Professional Services team provides a prescriptive approach to your successful implementation.

Learn about Professional Services
Netskope Professional Services
Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn about Training and Certifications
Group of young professionals working

Why organisations must rationalise cloud services to ensure GDPR readiness

Dec 19 2017
Data security

This is the second in a series of articles explaining how companies should address the daunting requirements around data security and cloud services contained in the GDPR. With the May 2018 compliance deadline looming, organisations should already be on the path to compliance. With cloud services a major part of the GDPR puzzle, this series of articles is designed to provide practical guidance to help organisations along the road to compliance.

In the previous article, we looked at how organisations could address the first “audit” stage. This first step in the GDPR compliance process can be broadly summed up in the following headings:

Discover every cloud application used by employees across the business;

Know which personally identifiable information (PII) and data are being processed in the cloud by employees, and understand whether this data is defined as “sensitive” under the GDPR;

Secure data by conducting a GDPR readiness assessment, checking that you have a DPA (data protection agreement) in place with all cloud services. Set and activate policies which mandate the use of managed cloud services to process and store PII;

Coach employees in best practice to ensure staff readily adopt and use the services approved by IT, and

Use a cloud access security broker (CASB) to evaluate whether the cloud apps and services in use across the business are enterprise-ready.

With those stages of the audit complete, the organisation will be in a much better position to assess what needs to be done to achieve GDPR compliance. The next question is how organisations action that insight to improve their GDPR readiness, which brings us to stage two: rationalise.

The rationalise stage is essentially about taking the learnings from the audit stage and applying those to the cloud services in use in order to shrink the organisation’s threat landscape.

Following the audit, IT teams will have a good picture of data at rest and in-transit (and indeed where that data is going). The report from the audit will also show which cloud services are in use across the organisation, what data is in there, and then whether there is a data processing agreement (DPA) in place.

Building on this information, the rationalise stage can be defined as follows:

Find cloud services in use from the audit stage which do not have a DPA in place;

Consolidate those services, narrowing down onto a manageable number of secure cloud services which have DPAs in place;

Sanction services which do not comply with the GDPR, and strongly consider blocking the use of those which are non-compliant and show serious security deficiencies. Transition to alternatives;

Execute a data protection agreement (DPA) with all services which are – or will be – in use by employees.

Organisations will need to be able to demonstrate to regulators that they have DPAs in place with all cloud services in use by employees. Likewise, a key part of the rationalise stage is proving that data does not go to apps which do not have a DPA in place with the organisation.

IT teams can use a CASB to examine traffic flowing to and from cloud services to inspect the data and characters being transmitted. This will determine if any of the data is PII, and therefore covered under the GDPR. If so, IT teams can take action within the platform to block data and stop it being transmitted by or stored in the cloud service in question.

Similarly, if an IT team discovers traffic flowing to or from a cloud service with which the organisation does not have a DPA in place, the team can block data flow to help ensure GDPR compliance. At this stage, a modern CASB can deliver a pop-up message to nudge the employee towards a compliant solution with which the organisation has a DPA in place. Essentially, the IT team is looking for preventative control over where data travel and are stored.

Data residency is another important piece of the puzzle. CASBs can shed light on where data resides via analysis of IP addresses which would show that the user is in the UK, but that the cloud service in question is hosted in South America (for example). While there is nothing in the GDPR to say that data cannot be stored outside of Europe, the organisation must guarantee that the third party is GDPR-compliant – and of course that there is a DPA in place.

Any analysis of cloud services in use should include assessments of specific GDPR parameters. As well as DPAs and data residency, a typical GDPR readiness calculation should check whether the customer owns the data under the terms of the cloud service, whether audit logs are recorded on data access, and the time taken by the “data processor” (the cloud service) to remove data from that service.

The GDPR readiness calculation should also assess whether data is encrypted at rest and/or in transit, whether the service provides measures for external authentication such as single sign-on (SSO) and whether the service has compliance certifications.

Some of these criteria are mandatory under the GDPR, others are recommended. But taken together, the answers to these questions will guide an organisation’s decision to rationalise on certain cloud services – jettisoning any services which don’t meet these standards.

The findings of the September 2017 Netskope Cloud Report™ on enterprise cloud service usage and trends emphasise the importance of the rationalise stage on the journey towards GDPR compliance. Investigating GDPR readiness among enterprise cloud services, the report found that almost three-quarters of cloud services still lack key capabilities to ensure compliance.

With the average number of cloud services standing at 1,022 per enterprise, this shows that organisations have to keep a careful eye on data flowing in and out of these services. To further muddy the waters, many cloud storage and collaboration services connect to other cloud services (for example, cloud storage connecting to Salesforce or DocuSign). A comprehensive cloud security programme should take into account what controls to place in cloud service-to-cloud service communications and processing, including making sure DPAs are in place with these “secondary” services.

It’s a difficult landscape, and the scale of the challenge clearly demonstrates why the rationalise stage is so important to GDPR compliance. Organisations must restrict services with no DPA, identify services to sanction and place security controls on, and finally execute DPAs.

Then once the rationalise stage is complete, it’s time to approach the third stage: enforce. We’ll cover that next time.

Stay informed!

Subscribe for the latest from the Netskope Blog