cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope debuta como Líder en el Cuadrante Mágico™ de Gartner® para Single-Vendor SASE
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Libro SD-WAN moderno para principiantes de SASE
                  Modern SD-WAN for SASE Dummies
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                            Netskope GovCloud
                            Netskope logra la alta autorización FedRAMP
                            Elija Netskope GovCloud para acelerar la transformación de su agencia.
                              Let's Do Great Things Together
                              La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.
                                Soluciones Netskope
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Soporte técnico Netskope
                                  Soporte técnico Netskope
                                  Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                                    Vídeo de Netskope
                                    Netskope Training
                                    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                                      3 Common Security Misconceptions

                                      Aug 16 2022

                                      In the past, cybersecurity has often been seen as disconnected from the rest of the IT team, as well as from an enterprise’s core business activities. Security professionals in some organisations have been left to operate in their own organisational structures, defining and enforcing policies with little interaction with other departments. This—and a perception that security is a “backstop” rather than a contributor to growth plans—has led to some stakeholders forming dangerous misconceptions about cybersecurity and its best practices. Allow me to mythbust three of the most prevalent misconceptions!

                                      Misconception #1: security is a self-contained function

                                      Time and again, cybersecurity incidents prove that breaches can have a devastating impact on businesses, even impacting stock prices. A lack of lines of communication about business objectives and operational decisions into security departments means organisations are often ill-prepared for potential attacks, and unable to identify and protect key data and digital assets. 

                                      Security teams should be the first to learn about any significant changes to the business, such as merger and acquisition activities, investments and divestments, outsourcing and insourcing. Each new business transformation carries risk, risk that must be identified and mitigated before disaster strikes. 

                                      Misconception #2: security is all about mitigation

                                      It’s often tempting to imagine cybersecurity as a sort of physical security guard; a black box appliance with a red blinky light. The appliance keeps “bad” things out while allowing “good” things in. This binary approach to data—labeling things as “good” or “bad”—is at the heart of many mitigation strategies.  

                                      And of course mitigation is important. Known malware must be fought off, and employees should always avoid sharing data through unapproved communication channels. However, a significant proportion of security incidents are caused by known and trusted traffic patterns, and therefore require a sophisticated approach, rather than just a signature or fingerprint. 

                                      This is where visibility and analytics come into play. Modern machine learning (ML)-driven security platforms enable SOCs to investigate suspicious behaviour beyond heavy-handed “allow” or “block” decisions, and take the necessary steps to prevent a potentially devastating impact on the business. 

                                      The old approach of “allow or block” doesn’t work anymore. Security needs to understand nuance and context, actively managing data protection with a zero trust methodology.

                                      Misconception #3: cloud service providers ensure the security of data in the cloud

                                      While any modern SaaS, IaaS, or PaaS delivers some form of security it would be naïve to assume that such an integrated service would resolve all potential challenges. Yet, time and time again organisations exempt their trusted cloud services from inline security control. As a result, cloud storage services and infrastructure are by far the most popular method for malicious actors to deliver malware, phish and exploit employee trust. Just see our latest Cloud and Threat Report to see all the big trusted names that malicious actors are using to deliver malware.

                                      Organisations need to ensure that their cloud presence is secured not only with integrated capabilities, but that is also controlled and audited using posture management tools. 

                                      author image
                                      Yaroslav Rosomakho
                                      With more than 20 years of experience, Yaroslav Rosomakho has worked to combine networking and security perspectives in addressing customer’s technical challenges.
                                      With more than 20 years of experience, Yaroslav Rosomakho has worked to combine networking and security perspectives in addressing customer’s technical challenges.

                                      ¡Mantente informado!

                                      Suscríbase para recibir lo último del blog de Netskope