Schließen
Schließen
Ihr Netzwerk von morgen
Ihr Netzwerk von morgen
Planen Sie Ihren Weg zu einem schnelleren, sichereren und widerstandsfähigeren Netzwerk, das auf die von Ihnen unterstützten Anwendungen und Benutzer zugeschnitten ist.
          Erleben Sie Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Netskope debütiert als Leader im Gartner ® Magic Quadrant ™ für Single-Vendor SASE
              Generative KI für Dummies sichern
              Generative KI für Dummies sichern
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Moderne Data Loss Prevention (DLP) für Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modernes SD-WAN für SASE Dummies-Buch
                  Modern SD-WAN for SASE Dummies
                  Hören Sie auf, mit Ihrer Netzwerkarchitektur Schritt zu halten
                    Verstehen, wo die Risiken liegen
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                            Netskope GovCloud
                            Netskope erhält die FedRAMP High Authorization
                            Wählen Sie Netskope GovCloud, um die Transformation Ihrer Agentur zu beschleunigen.
                              Let's Do Great Things Together
                              Die partnerorientierte Markteinführungsstrategie von Netskope ermöglicht es unseren Partnern, ihr Wachstum und ihre Rentabilität zu maximieren und gleichzeitig die Unternehmenssicherheit an neue Anforderungen anzupassen.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Technischer Support von Netskope
                                  Technischer Support von Netskope
                                  Überall auf der Welt sorgen unsere qualifizierten Support-Ingenieure mit verschiedensten Erfahrungen in den Bereichen Cloud-Sicherheit, Netzwerke, Virtualisierung, Content Delivery und Software-Entwicklung für zeitnahen und qualitativ hochwertigen technischen Support.
                                    Netskope-Video
                                    Netskope-Schulung
                                    Netskope-Schulungen helfen Ihnen, ein Experte für Cloud-Sicherheit zu werden. Wir sind hier, um Ihnen zu helfen, Ihre digitale Transformation abzusichern und das Beste aus Ihrer Cloud, dem Web und Ihren privaten Anwendungen zu machen.

                                      The Most Critical CASB Use Cases in the Market Today: Enforce Conditional, Activity-level Policies

                                      Feb 02 2017
                                      Tags
                                      CASB
                                      Cloud Best Practices
                                      Cloud Security
                                      Tools and Tips

                                      As we wrap up our quarter and fiscal year this week at Netskope, I’ve been reflecting on our business metrics and how they have changed over the past year. Ninety percent of our customers chose to deploy the Netskope Active Platform as a multi-mode cloud access security broker (CASB). Similarly, nine out of 10 are using our advanced, enterprise cloud DLP. And, on the other side of the spectrum, fewer than 15 percent are using us for Discovery only. It’s clear that the world has moved beyond the find-and-block mentality that was common in CASB 1.0. Enterprise IT is now demanding a different way to address cloud security. They no longer can – nor do they want to – suss out cloud services only to block them, instead opting for safe enablement strategies that address the real risks.

                                      Those real risks we’re talking about aren’t in the cloud services themselves, but rather in how cloud services are being used, i.e., user activities like upload, download, share, edit, delete, and approve, and in what context. For example, there’s nothing bad about sharing in the cloud…unless it’s my company’s nonpublic financial results and it’s two days before my earnings release. Similarly, there’s nothing bad about downloading from the cloud…unless it’s my entire employee base’s personal information, salaries, and latest performance reviews and I’m downloading that information to an unmanaged device. And finally, there’s nothing bad about editing in the cloud…unless I’m unauthorized and I’m modifying a field in a cloud-based financial application that is considered a financial “system of record.” You’ll notice that each of these activities – which is often benign when taken alone – can be risky under a certain set of conditions.

                                      Netskope customers have deployed our all-mode architecture to achieve their most critical use cases. We have noted 15 of these use cases in our recent e-book, The 15 Critical CASB Use Cases, and we’re highlighting them and more (and we want to hear from you too!) in this blog.  

                                      Here’s use case #9: Enforce conditional, activity-level policies.

                                      How can a CASB enable this use case? A CASB sits in between the user and the cloud service provider and monitors usage, enforces policy, and guards against threats. In order to enforce a conditional, activity-level policy, the CASB needs to see all possible traffic and be looking for specific activities plus all of the context surrounding those activities. Those contextual factors include user, group, organizational unit, device type, device OS, device classification and/or status, location, time of day, cloud service or service category, service rating, object name, object type, object size, DLP profile, if applicable, and more. From a deployment architecture standpoint, the CASB must be configured inline. If the enterprise wants to enforce conditional, activity-level policies for any unsanctioned services or across a category of services (as well as for users accessing via mobile or sync client), then it must be configured as a forward proxy (with a thin agent or mobile profile for remote or mobile employees). If the enterprise wants to enforce conditional, activity-level policies for a sanctioned service, and is willing to enforce policy only on browser traffic (versus all traffic, including mobile and sync client), then it can be configured in reverse proxy mode. Here are seven critical functional requirements that are needed to achieve this use case:

                                      • Be aware of activities such as “share” in cloud services, and be able to detect them across a range of services
                                      • See and control usage in both sanctioned and unsanctioned services
                                      • Differentiate between internal and external domains (to ascertain if content is being shared outside of the organization)
                                      • Enforce “set-it-once” policies across categories of services (if IT wants to set the activity-level policy across a category, e.g., no uploading protected health information (PHI) to any Collaboration service)
                                      • Detect and enforce policies by IP address, network location, or geo location (if location is one of the conditions in the policy)
                                      • Integrate with enterprise directory to enforce policies at a group or organization unit level
                                      • Decrypt SSL and decode the unpublished API to understand the transaction (for forward proxy)

                                      How are you enforcing conditional, activity-level policies in cloud services? We want to hear from you.

                                      Learn more about this and 14 additional most impactful use cases by downloading The 15 Critical CASB Use Cases.

                                      Bleiben Sie informiert!

                                      Abonnieren Sie den Netskope-Blog