Netskope named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Service Edge. Get the Report.

  • Platform

    Unrivaled visibility and real-time data and threat protection on the world's largest security private cloud.

  • Products

    Netskope products are built on the Netskope Security Cloud.

Netskope delivers a modern cloud security stack, with unified capabilities for data and threat protection, plus secure private access.

Explore our platform
Birds eye view metropolitan city

Netskope Named a Leader in the 2022 Gartner Magic Quadrant™ for SSE Report

Get the report Go to Products Overview
Netskope gartner mq 2022 sse leader

Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn more
Lighted highway through mountainside switchbacks

Prevent threats that often evade other security solutions using a single-pass SSE framework.

Learn more
Lighting storm over metropolitan area

Zero trust solutions for SSE and SASE deployments

Learn more
Boat driving through open sea

Netskope enables a safe, cloud-smart, and fast journey to adopt cloud services, apps, and public cloud infrastructure.

Learn more
Wind turbines along cliffside
  • Customer Success

    Secure your digital transformation journey and make the most of your cloud, web, and private applications.

  • Customer Support

    Proactive support and engagement to optimize your Netskope environment and accelerate your success.

  • Training and Certification

    Netskope training will help you become a cloud security expert.

Trust Netskope to help you address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Learn more
Woman smiling with glasses looking out window

We have qualified engineers worldwide, with diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ready to give you timely, high-quality technical assistance.

Learn more
Bearded man wearing headset working on computer

Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn more
Group of young professionals working
  • Resources

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog

    Learn how Netskope enables security and networking transformation through security service edge (SSE).

  • Events & Workshops

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

Bonus Episode: The Importance of Security Service Edge (SSE)

Play the podcast
Black man sitting in conference meeting

Read the latest on how Netskope can enable the Zero Trust and SASE journey through security service edge (SSE) capabilities.

Read the blog
Sunrise and cloudy sky

Netskope CSO speaking events

Meet the Netskope CSO team at one of our upcoming events.

Find an event
Netskope CSO Team

What is Security Service Edge?

Explore the security side of SASE, the future of network and protection in the cloud.

Learn more
Four-way roundabout
  • Company

    We help you stay ahead of cloud, data, and network security challenges.

  • Why Netskope

    Cloud transformation and work from anywhere have changed how security needs to work.

  • Leadership

    Our leadership team is fiercely committed to doing everything it takes to make our customers successful.

  • Partners

    We partner with security leaders to help you secure your journey to the cloud.

Netskope enables the future of work.

Find out more
Curvy road through wooded area

Netskope is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Learn more
Switchback road atop a cliffside

Thinkers, builders, dreamers, innovators. Together, we deliver cutting-edge cloud security solutions to help our customers protect their data and people.

Meet our team
Group of hikers scaling a snowy mountain

Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn more
Group of diverse young professionals smiling
Blog Uncategorized What’s the Right Role for a CASB in the Cloud Encryption Value Chain?
Sep 12 2016

What’s the Right Role for a CASB in the Cloud Encryption Value Chain?

Since Cloud Access Security Brokers (CASB) came onto the scene a few years ago, the industry has debated CASBs’ role in the cloud application encryption value chain. With more than 30 percent of business data now in the cloud, identifying and protecting the confidentiality of sensitive or regulated content is critically important. That said, much of cloud apps’ value is in how easy they are to use and collaborate, giving business and IT professionals pause when it comes to deciding what protection mechanisms to put in place and how onerous they should be.

Some CASBs built their business model around performing gateway encryption for apps like Salesforce.com or Box. While this has generally worked for unstructured data, it has had mixed results for structured data like the “notes” field in a database: From a compliance and risk management standpoint, encrypting regulated data has served as a useful check box, especially in the event of a data breach. However, in many cases, gateway encryption has rendered apps nearly unusable because it has broken search and sort, not to mention created performance issues associated with backhauling traffic on-premises.

To address the dilemma, leading app vendors have built native encryption into their platforms in a way that preserves functionality and optimizes for the way people use the app. Where the rubber really hits the road from a value standpoint is with key management, or the generation, exchange, storage, use, and replacement of the crypto keys used to encrypt content within cloud apps. Most enterprises – especially heavily regulated ones – consider on-premises, enterprise-run key management to be a best practice.

Both Salesforce and Box have released flexible key management programs – Salesforce Shield and Box KeySafe – that give customers choices when it comes to key management, including the option of integrating with their own enterprise key management system. Also known as “bring your own key” (BYOK), this flexibility caps off an evolution toward bringing together the best of both worlds: encryption that runs in the application and preserves functionality, coupled with enterprise-managed keys.

So where do CASBs – vendors whose role is to provide visibility, compliance, data security, and threat protection to cloud apps – fit into this value chain? Since CASBs like Netskope are becoming the policy aggregation point for inline and API-based access, activities, and DLP policies, it makes sense to add encryption policies to that mix. This is especially true in a multi-cloud environment in which organizations need to enforce encryption policies across multiple cloud services. To summarize, in the cloud encryption value chain, each entity plays an important role:

  • The enterprise manages the keys;
  • The app manages the encryption; and
  • The CASB manages the policies.

At Netskope, we have embraced this model by working closely with our customers, app vendor partners, and security partners. We have delivered an integrated solution that hides the ins-and-outs of different app vendors’ encryption architecture, seamlessly snaps into different hardware security module (HSM) solutions, serves as a transparent broker between enterprise key management and the app with zero visibility of encryption keys, and preserves enterprises’ key management processes and workflows. Beyond facilitating encryption policy and key brokering between enterprises and their cloud services that offer BYOK, Netskope – as a single cloud policy control point – also handles encryption for unstructured data in apps that don’t offer encryption.


Netskope’s all-mode deployment architecture enables our CASB to sit between users and their apps, wherever either might be, and enforce a broad array of granular policies both inline and out-of-band. It makes sense that enterprises would take advantage of our unique and strategic position to tackle encryption policy management – a critical piece of the cloud encryption value chain – across all of the services in which enterprises wish to protect sensitive data.