Netskope is recognized as a Leader again in the Gartner® Magic Quadrant™ for SASE Platforms. Get the Report

close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
Experience Netskope
Get Hands-on With the Netskope Platform
Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
A Leader in SSE. Now a Leader in Single-Vendor SASE.
Netskope is recognized as a Leader Furthest in Vision for both SSE and SASE Platforms
2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
One unified platform built for your journey
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
Modern data loss prevention (DLP) for Dummies eBook
Modern Data Loss Prevention (DLP) for Dummies
Get tips and tricks for transitioning to a cloud-delivered DLP.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Stop playing catch up with your networking architecture
Understanding where the risk lies
Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
Netskope Technical Support
Netskope Technical Support
Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
Netskope video
Netskope Training
Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

Smart Cloud Security: Recover from Cloud-based Ransomware Infections

Aug 21 2018
Tags
CASB
Cloud Best Practices
Cloud Malware
Ransomware
Tools and Tips

This is yet another post on ransomware – so we’ll keep this short. But, for cloud-first organizations, this post is an important one. Not only is ransomware hard to detect, but also hard to recover from. Recovery cost, whether or not the organization pays a ransom, is high as well. Often, organizations hit by ransomware have little recourse but to negotiate and pay the ransom and hope they can recover their mission-critical systems and data.

Netskope customers have deployed our unified, cloud-native platform to enforce policies across SaaS, IaaS, and web to recover from cloud-based ransomware attacks. We have noted 20 of these use cases in our e-book, 20 Examples of Smart Cloud Security, and we’re highlighting each one in this blog.

Here’s use case #20: Recover from cloud-based ransomware infections.

Cloud-based ransomware infections are troubling because across an organization, many users will have synced folders that are shared with many others. When files start being encrypted on the device of one person, that file in a sync folder will update and propagate across to all the other people part of that shared sync folder, an effect we call the “malware fan-out.” So while it’s easy to share files, it’s also easy to spread the ransomware-infected files. You’ll need a solution that will alert you when a ransomware infection has taken place and provide a seamless workflow to recover from the infection.

How can a CASB enable this use case? A CASB sits in between the user and the cloud service provider and monitors usage, secures data, and guards against threats. In the case of recovering from a cloud-based ransomware infection, a CASB needs to have an API-based deployment into the sanctioned cloud service to detect the ransomware and start the workflow to revert files back to their previous, unencrypted state. Versioning capabilities in the cloud storage service will need to be activated for full functionality.

Besides deployment choices, here are some functional requirements needed to achieve this use case:

  • Use 70 different signals to identify unauthorized encryption
  • Integration with cloud storage services like OneDrive to enable “roll-back” functionality
  • A streamlined UI to enable an intuitive workflow for rolling back infected content to pre-infected state
Connect with Netskope

Subscribe to the Netskope Blog

Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.