Schließen
Schließen
Ihr Netzwerk von morgen
Ihr Netzwerk von morgen
Planen Sie Ihren Weg zu einem schnelleren, sichereren und widerstandsfähigeren Netzwerk, das auf die von Ihnen unterstützten Anwendungen und Benutzer zugeschnitten ist.
          Erleben Sie Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Netskope debütiert als Leader im Gartner ® Magic Quadrant ™ für Single-Vendor SASE
              Generative KI für Dummies sichern
              Generative KI für Dummies sichern
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Moderne Data Loss Prevention (DLP) für Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modernes SD-WAN für SASE Dummies-Buch
                  Modern SD-WAN for SASE Dummies
                  Hören Sie auf, mit Ihrer Netzwerkarchitektur Schritt zu halten
                    Verstehen, wo die Risiken liegen
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                            Netskope GovCloud
                            Netskope erhält die FedRAMP High Authorization
                            Wählen Sie Netskope GovCloud, um die Transformation Ihrer Agentur zu beschleunigen.
                              Let's Do Great Things Together
                              Die partnerorientierte Markteinführungsstrategie von Netskope ermöglicht es unseren Partnern, ihr Wachstum und ihre Rentabilität zu maximieren und gleichzeitig die Unternehmenssicherheit an neue Anforderungen anzupassen.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Technischer Support von Netskope
                                  Technischer Support von Netskope
                                  Überall auf der Welt sorgen unsere qualifizierten Support-Ingenieure mit verschiedensten Erfahrungen in den Bereichen Cloud-Sicherheit, Netzwerke, Virtualisierung, Content Delivery und Software-Entwicklung für zeitnahen und qualitativ hochwertigen technischen Support.
                                    Netskope-Video
                                    Netskope-Schulung
                                    Netskope-Schulungen helfen Ihnen, ein Experte für Cloud-Sicherheit zu werden. Wir sind hier, um Ihnen zu helfen, Ihre digitale Transformation abzusichern und das Beste aus Ihrer Cloud, dem Web und Ihren privaten Anwendungen zu machen.

                                      5 tips for using a CASB to safely enable social media in your business

                                      Jul 25 2016
                                      Tags
                                      CASB
                                      Cloud Best Practices
                                      Cloud Security
                                      Tools and Tips

                                      From Facebook’s 1.65 billion monthly active users to Twitter’s rise as a mainstream broadcast media outlet, social media continues to experience rapid and wide adoption from users around the globe. For the enterprise, social media presents both opportunities and challenges. The opportunity is primarily centered around leveraging social to make your employees more collaborative and productive at their job, not to mention the many benefits to the business. If you aren’t interacting with your customers via social media, there is a good chance that your competitors are.

                                      Even with all the upside, there are a number of challenges that are impacting the adoption of social media in the enterprise. First, social media promotes transparency and some businesses are not ready to change their culture overnight. The other challenge is the risk associated with sensitive data leaking via social media. What if someone posts or shares something they are not supposed to? What would be the impact to our company if intellectual property was leaked, customer data exposed, or out-of-compliance activities took place? Compliance is a real issue whether it is FINRA compliance for financial firms, PCI for retail, or protected health information (PHI) that is connected to HIPAA compliance. Social media makes it very easy to share anything and that anything could be cause for concern depending on the scope of your business.

                                      The question is, do you embrace social media in your place of business and reap all the benefits or do you block social media altogether? This is the catch-22 as you ultimately need to make the decision between using social or being safe. What if you could enable the use of social media in your business, but do it safely? I want to share with you how a cloud access security broker (CASB) such as Netskope can let you have your cake and eat it too. Here are 5 tips.

                                      Tip #1 Use a scalpel, not a sledgehammer

                                      Your first inclination might be to just outright block social media by using your perimeter security device. Instead, use a CASB that can identify and block risky activities taking place in real-time. A risky activity could be someone from the hospital staff posting PHI to a social media app of their choice. Focusing on the risky activity instead of being forced to block the app outright means that everyone can use the app safely.

                                      Tip #2 Implement a category-level policy

                                      There are the mainstream social media apps like Facebook, Twitter, LinkedIn, and Snapchat and then there are the dozens or potentially hundreds of social media apps that could be in use by users. In fact, a recent Netskope Cloud Report found that an enterprise has 23 social media apps in use on average. Make sure that your CASB supports a category-level policy that can administered to cover all social media apps. The last thing you want to do is create and manage dozens of policies individually.

                                      Tip #3 Don’t be blind. Cover all ways social is being used

                                      There are two primary ways that users interact with social media apps. First is the browser from their Mac to PC and the other way is from an app on their iOS or Android device. Make sure that your CASB can inspect social media usage involving both browsers and mobile apps. If you can’t cover mobile apps then you are leaving yourself vulnerable.

                                      Tip #4 Incorporate advanced DLP into your policy

                                      This is tied to the scalpel approach covered in tip #1. The key here is that you need to be able to inspect not only attachments and text that is part of a social media post or share, but you need to do it in a smart way so you don’t end up with a ton of false positives and end of blocking everything. The example I like to use is a financial services company that wanted to safely enable social media, but at the same time be FINRA compliant. This involved looking for keywords such as “guarantee” or “recommend” combined with public company names and stock symbols. This requires that your CASB have an advanced cloud DLP solution with AND/OR rules, custom keyword dictionaries, proximity, and other key features. You can learn more about this use case by watching this demo video.

                                      Tip #5 Coach users

                                      The final tip is focused on end user experience and behavior modification. A successful enterprise social media strategy involves training users to use their best judgement. This traditionally involves training classes, email reminders, and even getting users to sign agreements. You can take this a step further by using a CASB to implement real-time coaching and have custom messages pop up when the user performs an out-of-compliant action. When they attempt to do something risky, warn them in real-time and coach them to do the right thing.

                                      Speaking of social media, I would love to connect with you on Twitter. You can follow me @bobegilbert

                                      author image
                                      Bob Gilbert
                                      As Vice President of Strategy and Chief Evangelist at Netskope, Bob is dedicated to helping clients transform their security and networking infrastructure.
                                      As Vice President of Strategy and Chief Evangelist at Netskope, Bob is dedicated to helping clients transform their security and networking infrastructure.

                                      Bleiben Sie informiert!

                                      Abonnieren Sie den Netskope-Blog