Netskope named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Service Edge. Get the Report.

  • Products

    Netskope products are built on the Netskope Security Cloud.

  • Platform

    Unrivaled visibility and real-time data and threat protection on the world's largest security private cloud.

Netskope Named a Leader in the 2022 Gartner Magic Quadrant™ for SSE Report

Get the report Go to Products Overview
Netskope gartner mq 2022 sse leader

Netskope delivers a modern cloud security stack, with unified capabilities for data and threat protection, plus secure private access.

Explore our platform
Birds eye view metropolitan city

Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn more
Lighted highway through mountainside switchbacks

Prevent threats that often evade other security solutions using a single-pass SSE framework.

Learn more
Lighting storm over metropolitan area

Zero trust solutions for SSE and SASE deployments

Learn more
Boat driving through open sea

Netskope enables a safe, cloud-smart, and fast journey to adopt cloud services, apps, and public cloud infrastructure.

Learn more
Wind turbines along cliffside
  • Customer Success

    Secure your digital transformation journey and make the most of your cloud, web, and private applications.

  • Customer Support

    Proactive support and engagement to optimize your Netskope environment and accelerate your success.

  • Training and Certification

    Netskope training will help you become a cloud security expert.

Trust Netskope to help you address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Learn more
Woman smiling with glasses looking out window

We have qualified engineers worldwide, with diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ready to give you timely, high-quality technical assistance.

Learn more
Bearded man wearing headset working on computer

Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn more
Group of young professionals working
  • Resources

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog

    Learn how Netskope enables security and networking transformation through security service edge (SSE).

  • Events & Workshops

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

Bonus Episode: The Importance of Security Service Edge (SSE)

Play the podcast
Black man sitting in conference meeting

Read the latest on how Netskope can enable the Zero Trust and SASE journey through security service edge (SSE) capabilities.

Read the blog
Sunrise and cloudy sky

SASE Week

Netskope is positioned to help you begin your journey and discover where Security, Networking, and Zero Trust fit in the SASE world.

Learn more
SASE Week

What is Security Service Edge?

Explore the security side of SASE, the future of network and protection in the cloud.

Learn more
Four-way roundabout
  • Company

    We help you stay ahead of cloud, data, and network security challenges.

  • Why Netskope

    Cloud transformation and work from anywhere have changed how security needs to work.

  • Leadership

    Our leadership team is fiercely committed to doing everything it takes to make our customers successful.

  • Partners

    We partner with security leaders to help you secure your journey to the cloud.

Netskope enables the future of work.

Find out more
Curvy road through wooded area

Netskope is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Learn more
Switchback road atop a cliffside

Thinkers, builders, dreamers, innovators. Together, we deliver cutting-edge cloud security solutions to help our customers protect their data and people.

Meet our team
Group of hikers scaling a snowy mountain

Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn more
Group of diverse young professionals smiling
Blog Full Skope, Platform, Products, & Services The Looming Issue with Email Sharing
Sep 11 2022

The Looming Issue with Email Sharing

If you’ve been following my suggestions in this series, then your SaaS sharing configuration now protects sensitive information and your IaaS/PaaS access controls accurately follow the principle of least privilege. Of course, that doesn’t mean you’re done! We must now tame the giant of all file-sharing beasts: email. An email is probably the worst way to share files because there’s no way to limit who sees the file after it is sent. When you email an attachment to somebody, you’ve lost control of it. Even though some form of control over file sharing will always be necessary, don’t tighten your SaaS settings so much that you force people to go around your controls and pick email.

It comes back to this idea of balancing risk and utility. Make it easy for your users to request when they need to share something externally, and then monitor how that permission is used and nudge users toward good behaviors. This could be as simple as a self-service mechanism, an automated help desk support system or even a bot assistant that provides automatic coaching prompts to guide users to approved applications. Whatever it is, the barrier to receiving permission to share something externally should be low and justifiable to the business.

Control beyond the cloud: EDRM

Even if all the permissions are correct—there’s a business justification for sharing a file and the controls have been configured appropriately so that only authorized users have access—once an authorized user downloads the file, the organization can lose control of sensitive information once again. Alice receives access to a sensitive file stored in Salesforce and makes a local copy. Bob would like one, too, but his Salesforce permissions don’t allow it. What’s to prevent Alice from forwarding it to Bob in an email message or a Slack conversation? Nothing. After all, it’s a local copy—it isn’t under the control of the cloud.

This is where enterprise digital rights management (EDRM) becomes a part of your security strategy. EDRM places a wrapper around the file. The wrapper encrypts the contents and appends an access control list right into the file itself. When an authorized user accesses the file, they must first supply their credentials. To continue our example, Alice’s company applies EDRM to all W2 forms. After Alice downloads and tries to open one, the EDRM system checks whether Alice is on the access control list—and if she is, her computer will display a decrypted version of the file and enforce any other restrictions (such as no-save-as, no-print, etc.).

It’s still a file, though, meaning Alice can do file-type stuff like forwarding a copy to Bob, which she does. Bob has no legitimate business need to see W2 forms and is therefore not included in the access control list appended to the file. When Bob attempts to open the copy, the EDRM system checks whether he’s on the access control list. Because he isn’t, we can predict what’s next: Bob’s computer refuses to open the file and displays an error message indicating insufficient permission.

Note that the file is never stored on disk in clear-text. Protected files contain only wrappers and encrypted data. The EDRM system displays decrypted contents only after authorized users have authenticated, but the data in storage remains encrypted. EDRM allows organizations to retain control over their sensitive information even when the sensitive information is no longer visible to the cloud.

Don’t shirk shared responsibility in the cloud

No one wants to appear in the news because a simple cloud setting unintentionally led to sensitive files gracing the fingertips of the wrong people. Solving the bigger problem of cloud applications breached from misconfigurations starts by assessing how people need to exchange information and with whom. The next step is establishing a governance program that facilitates safe sharing, mediated by security tools that detect and mitigate common sharing risks in the course of everyday business operations.

This article was originally published on Forbes Tech Council

author image
About the author
Steve Riley is a Field CTO at Netskope. Having worked at the intersection of cloud and security for pretty much as long as that’s been an actual topic, Steve offers that perspective to field and executive engagements and also supports long-term technology strategy and works with key industry influencers. Steve has held technology roles for more than three decades, including stints at Gartner Inc., Riverbed Technology, Amazon Web Services, and Microsoft Corp.
Steve Riley is a Field CTO at Netskope. Having worked at the intersection of cloud and security for pretty much as long as that’s been an actual topic, Steve offers that perspective to field and executive engagements and also supports long-term technology strategy and works with key industry influencers. Steve…