close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
          Experience Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            Netskope debuts as a Leader in the Gartner® Magic Quadrant™ for Single-Vendor SASE
              Securing Generative AI for Dummies
              Securing Generative AI for Dummies
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Modern Data Loss Prevention (DLP) for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modern SD-WAN for SASE Dummies Book
                  Modern SD-WAN for SASE Dummies
                  Stop playing catch up with your networking architecture
                    Understanding where the risk lies
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                            Netskope GovCloud
                            Netskope achieves FedRAMP High Authorization
                            Choose Netskope GovCloud to accelerate your agency’s transformation.
                              Let's Do Great Things Together
                              Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskope Technical Support
                                  Netskope Technical Support
                                  Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
                                    Netskope video
                                    Netskope Training
                                    Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

                                      New Report Links Positive Business Outcomes to More Mature Approach to Cloud Security

                                      Jun 28 2018
                                      Tags
                                      CASB
                                      Cloud Access Security Broker
                                      Cloud Best Practices
                                      cloud forward
                                      cloud maturity model
                                      Cloud Security
                                      cloud security maturity
                                      enterprise strategy group
                                      ESG
                                      Tools and Tips

                                      Netskope just completed some interesting new research with Doug Cahill, a senior cybersecurity analyst at Enterprise Strategy Group (ESG). We partnered with Doug and the ESG team to conduct this research in order to better understand the business ramifications of different approaches to cloud security.

                                      Our hypothesis was that “cloud forward” organizations – those who adopt cloud services more and who are also more open to user-led services (aka “shadow IT”) – would experience different business outcomes than other organizations. As you can see in the new report entitled “The Maturity of Cloud Application Security Strategies,” that hypothesis was correct. “Cloud forward” organizations do experience more positive business outcomes.

                                      This new research is based on surveys of more than 350 worldwide IT and cybersecurity professionals who are involved in their organization’s cloud security program. These surveys were conducted in the first half of 2018, across a wide range of industries and with 88% of respondents coming from larger organizations with more than 1,000 employees.

                                      Stages of Cloud Security Maturity

                                      The research report establishes three different stages of cloud security maturity based on an organization’s approach to cloud security:

                                      • Stage 1. “Discoverers,” who primarily want to discover and assess user-led cloud services, typically with the goal of blocking them or redirecting users to an approved, IT-delivered application.
                                      • Stage 2. “Controllers,” who are primarily focused on securing the rollout of IT-driven cloud services such as Office 365, G Suite, Box, among others. The focus of this group is to prevent data loss and guard against threats for a limited set of cloud applications.
                                      • Stage 3. “Enablers,” who are well aware of user-led cloud services but understand the business need for those services. Seeking a balance between productivity and security, this group engages their users to understand their needs and permits user-led cloud services while applying non-intrusive controls to enable them safely.

                                      Our research found that 48% of respondents were categorized as discoverers, 31% as controllers, and 21% as enablers.

                                      At Netskope, we’ve seen these different approaches to cloud security with our customers since we entered the market five years ago. Not surprisingly, in the early days the “discover” and “control” approaches were the most common ones that we saw, but over the years we’ve seen more and more of our customers move to the “enable” approach. In many cases, early attempts to “discover and block” user-led cloud services were difficult to maintain, as the business benefits of these services were undeniable.

                                      Varying Business Outcomes by Stage

                                      This research report goes on to help quantify the positive business benefits that mature organizations realize by enabling user-led cloud services. Here are a few of the business benefits highlighted in the report:

                                      • Reacting faster to changing market conditions. Organizations that take advantage of the agility of cloud services to help them innovate and expedite delivery of new products and services feel that they have an edge over their competition. In this report, Stage 3 organizations – “Enablers” – were almost twice as likely to report that they are “always or often ahead of our competition” in their ability to react to changing market conditions.
                                      • Maximizing user productivity with fast time-to-value. “Enablers” were also more likely than other groups to report meeting or beating their application deployment schedules and nearly half of them reported that user-led cloud applications had a “strong positive impact” on user productivity.
                                      • Delivering strong revenue results. Finally, “Enablers” were more likely to report that their organizations were exceeding their revenue expectations, possibly linked to the previous two benefits described above.

                                      I can’t say that these results surprised us. Our intuition has always been that “cloud forward” organizations were more agile and productive. And with many successful, publicly-traded companies included in our growing list of customers, we know first hand that many “cloud forward” organizations experience strong financial performance.

                                      If you’d like a copy of this new report, you can find it here. And if you’re wondering where your organization fits on the cloud security maturity curve, we invite you to take this self-assessment. It will help you see where you stand relative to your peers and to get recommendations on how to take a more mature approach to cloud security in your own organization.

                                      author image
                                      Netskope Staff
                                      Browse recent articles by Netskope Staff. Discover the latest trends and updates within the cloud and network space.
                                      Browse recent articles by Netskope Staff. Discover the latest trends and updates within the cloud and network space.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog