Netskope es nombrado líder en el Cuadrante Mágico™ de Gartner 2022 para Security Service Edge. Obtenga el informe

  • Security Service Edge Products

    Protect against advanced and cloud-enabled threats and safeguard data across all vectors.

  • Borderless SD-WAN

    Confidently provide secure, high-performance access to every remote user, device, site, and cloud.

  • Plataforma

    Visibilidad inigualable y protección contra amenazas y datos en tiempo real en la nube privada de seguridad más grande del mundo.

Netskope ha sido nombrado Líder en el Informe del Cuadrante Mágico de Gartner™ 2022 en SSE

Obtenga el informe Todos los productos
Líder SSE Netskope gartner mq 2022

Respuesta rápida de Gartner®: ¿Cómo afecta la adquisición de Netskope a los proyectos SD-WAN, SASE y SSE?

Obtenga el informe
Quick Answer: How Does Netskope’s Acquisition of Infiot Impact SD-WAN, SASE and SSE Projects?

Netskope ofrece una estrategia de seguridad cloud moderna, con capacidades unificadas para los datos y protección frente a amenazas, además de un acceso privado seguro.

Explora nuestra plataforma
Vista aérea de una ciudad metropolitana

Cambie a los servicios de seguridad en la nube líderes del mercado con una latencia mínima y una alta fiabilidad.

Más información
Lighted highway through mountainside switchbacks

Prevenga las amenazas que a menudo eluden otras soluciones de seguridad utilizando un marco SSE de un solo paso.

Más información
Lighting storm over metropolitan area

Soluciones de confianza cero para implementaciones de SSE y SASE

Más información
Boat driving through open sea

Netskope hace posible un proceso seguro, rápido y con inteligencia cloud para la adopción de los servicios en la nube, las aplicaciones y la infraestructura de nube pública.

Más información
Wind turbines along cliffside
  • Nuestros clientes

    Netskope da servicio a más de 2.000 clientes en todo el mundo, entre los que se encuentran más de 25 de las 100 empresas de Fortune

  • Soluciones para clientes

    Le apoyamos en cada paso del camino, garantizando su éxito con Netskope.

  • Formación y certificación

    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube.

Ayudamos a nuestros clientes a estar preparados para cualquier situación

Ver nuestros clientes
Woman smiling with glasses looking out window

El talentoso y experimentado equipo de servicios profesionales de Netskope proporciona un enfoque prescriptivo para su exitosa implementación.

Más información
Netskope Professional Services

Asegure su viaje de transformación digital y aproveche al máximo sus aplicaciones en la nube, web y privadas con la capacitación de Netskope.

Más información
Group of young professionals working
  • Recursos

    Obtenga más información sobre cómo Netskope puede ayudarle a proteger su viaje hacia la nube.

  • Blog

    Descubra cómo Netskope permite la transformación de la seguridad y las redes a través del servicio de seguridad (SSE).

  • Eventos & Workshops

    Manténgase a la vanguardia de las últimas tendencias de seguridad y conéctese con sus pares.

  • Security Defined

    Todo lo que necesitas saber en nuestra enciclopedia de ciberseguridad.

Podcast Security Visionaries

Episode 15: Building Permanent Security Awareness

Reproducir el pódcast
Black man sitting in conference meeting

Lea lo último sobre cómo Netskope puede hacer posible el viaje de confianza cero y SASE a través de las capacidades de SSE.

Lea el blog
Sunrise and cloudy sky

Semana SASE

Netskope puede ayudarle a dar los primeros pasos en el mundo SASE y a descubrir qué papel desempeñan en él la seguridad, las conexiones de red y Zero Trust.

Más información
Semana SASE

¿Qué es Security Service Edge (SSE)?

Explore el lado de la seguridad de SASE, el futuro de la red y la protección en la nube.

Más información
Four-way roundabout
  • Empresa

    Le ayudamos a mantenerse a la vanguardia de los desafíos de seguridad de la nube, los datos y la red.

  • Por qué Netskope

    La transformación de la nube y el trabajo desde cualquier lugar han cambiado la forma en que debe funcionar la seguridad.

  • Liderazgo

    Nuestro equipo de liderazgo está firmemente comprometido a hacer todo lo necesario para que nuestros clientes tengan éxito.

  • Partners

    Nos asociamos con líderes en seguridad para ayudarlo a asegurar su viaje a la nube.

Netskope posibilita el futuro del trabajo.

Descubra más
Curvy road through wooded area

Netskope está redefiniendo la seguridad de la nube, los datos y la red para ayudar a las organizaciones a aplicar los principios de Zero Trust para proteger los datos.

Más información
Switchback road atop a cliffside

Pensadores, constructores, soñadores, innovadores. Juntos, ofrecemos soluciones de seguridad en la nube de vanguardia para ayudar a nuestros clientes a proteger sus datos y usuarios.

Conozca a nuestro equipo
Group of hikers scaling a snowy mountain

La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.

Más información
Group of diverse young professionals smiling

6 Key Considerations for Selecting a Zero Trust Network Access (ZTNA) Solution

Jul 26 2022

Zero trust network access (ZTNA) has become a hot topic and a popular IT project. Here are some of the reasons why:   

First, organizations are beginning to pursue a zero trust strategy and ZTNA is the first logical step towards a zero trust security program. Second, remote or hybrid work is here to stay. And as a result, now is the time to replace your legacy remote access VPN with a modern anywhere secure access solution for the long term. Third, digital transformation and cloud-first strategies continue to evolve and legacy access methods are not well suited for the cloud environment.  

Regardless of the motivation behind zero trust network access initiative, creating a short list of ZTNA solutions to evaluate in a crowded market can be daunting. Last time I checked, there were 42 vendors listed in Gartner’s market guide for ZTNA. 

But, not all ZTNA solutions are created equally, so here are some considerations to help you narrow down your list.  

1. Platform matters.

Whether you are selecting and implementing ZTNA for remote/ hybrid work, starting an initial project on a bigger zero trust security journey, or you have a fully mapped out vision for security service edge (SSE) and secure access service edge (SASE) architecture, it is best to work with a vendor with a full SSE platform with a single agent, single console, and single policy engine, and support for a multi-cloud environment. 

Like most organizations, yours is probably operating in a hybrid cloud, or multi-cloud environment with a mix of applications hosted in private data centers and public cloud environments, as well as using cloud applications (or SaaS).  

I am also willing to bet that your current environment is subject to change. For example, you might have an active project to transform your on-premises enterprise resource planning (ERP) system to be hosted in a cloud environment, or to adopt Cloud-ERP.  

An integrated SSE platform helps you deliver a seamless zero trust application access with consistent policy controls and a great user experience regardless of where the applications are hosted.  

Gartner estimates that “By 2025, 70% of organizations that implement agent-based zero trust network access (ZTNA) will choose a security service edge (SSE) provider for ZTNA, rather than a stand-alone offering, up from 20% in 2021.”*

2. Enable hybrid work from anywhere.

To enable hybrid work from anywhere, coverage and performance are critical.   It’s important to select a vendor that has a footprint that can match your global expansion plans and increase enterprise agility. Ensure that you work with a ZTNA provider that has data centers in all major geographic locations where your employees may be connecting. Your vendor selection should not solely be based on counting data centers but choosing one that has the full security stack available in every region—with full compute at the edge close to your users—with low-latency on-ramps combined with extensive peering for the best experience.  

Work with a vendor who’s services are backed by Service Level Agreements (SLAs) that provide critical commitments around uptime/availability and performance, as tools for ensuring a superior end-to-end user and application experience. For example Netskope Digital Experience Management (DEM) provides critical monitoring of all user traffic with actionable insights into network and application performance, addressing web, cloud, SaaS, as well as private applications being accessed via ZTNA.

3. Protect data everywhere. 

Your ZTNA solution should detect data usage, activities, and behavior anomalies (UEBA), enforce advanced DLP rules and policies, and apply adaptive access policy based on user risks.

ZTNA securely connects users to private applications and resources. Often these resources are the crown jewels of the organization, from engineering code to other forms of proprietary data such as trade secrets. Select a solution that provides multiple options for data protection to help your organization protect sensitive information. For example, a modern ZTNA solution should provide options to inspect traffic and apply DLP rules and policies to protect data. However, some organizations may prefer UEBA and user risk ratings to gain real-time context to minimize insider risks without decrypting traffic. 

4. Easy-to-set policies.

In addition to having a single agent, with a truly integrated SSE platform, you will only need to configure the identity and directory service once using a unified console.  Similarly, with a centralized DLP engine, you only need to define it once and the DLP rules and policy will be enforced across the platform.   You will gain the benefits of enabling access to cloud, and private applications in just a few days to better support M&A and other time-sensitive activities. Don’t get stuck with an application VPN and complex firewall rules masquerading as ZTNA.  

5. Effective third-party integration.

With the right integrations and exchanges in multi-vendor environments, ZTNA can thrive. The best exchanges offer user and device trust scores that are normalized across the environment and can trigger adaptive access controls, user group settings, and automated workflow ticketing for investigation. For example, through a tight integration with third-party directory services, your ZTNA solution should reflect user risk score in real time, apply adaptive access policy, including rescind access if users are no longer authorized (ie. left the organization).

6. Future proof your plan. 

The ZTNA market is in flux, and industry experts expect that in the next three years, this space will go through a major consolidation. As mentioned earlier, your environment is also changing. Digital transformation is a journey and your zero trust implementation is also a journey. As I have discussed in my previous blog, it is important to understand your use cases today, and your organization’s vision and future plans.  

In addition to selecting a vendor with staying power, you also want to compare your internal plans with the vendor’s vision and road map and ensure they are aligned.

Final thoughts 

Remember that zero trust does NOT mean to “trust no one”. In order to enable business, you have to extend access (trust). The key to leveraging zero trust principles across your organization, whether specifically with ZTNA or otherwise, is to use technology to make better, context-aware decisions about trust and access for a given user and to continuously monitor and adapt to mitigate risks. This context is based on a number of factors, such as user role and identity, device identity, security posture, app type, app risk, and app instance, plus the sensitivity level of the data. Contextual decisions result in robust access policies that are risk-optimized, and can uniformly be applied across the cloud, web, and private apps, while enabling business agility and user productivity. 

Enterprises are rapidly adopting security service edge (SSE) capabilities to securely enable the benefits of a SASE architecture. A critical piece of SSE is a zero trust network access (ZTNA) solution that enables application-specific connectivity for users anywhere. Security Service Edge supports the consolidation of security functions, a lower total cost of ownership, and improves operational efficiency in the long term, leading to better overall security. 

Learn more about the Netskope ZTNA solution, Netskope Private Access, here   

* Gartner “Market Guide for Zero Trust Network Access, ”   Aaron McQuaid, Neil MacDonald, John Watts, Feb 17, 2022

*Gartner, “Magic Quadrant for Security Service Edge,” John Watts, Craig Lawson, Charlie Winckless, Aaron McQuaid, February 15, 2022

Gartner y Magic Quadrant son marcas registradas de Gartner, Inc. y/o sus filiales en los Estados Unidos y a nivel internacional y se utilizan aquí con permiso. Todos los derechos están reservados.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Netskope.

author image
Tsailing Merrem
Tsailing Merrem es la directora de marketing de producto de Netskope. Tsailing es responsable de la evangelización de la tecnología de acceso a la red basado en confianza cero (ZTNA) y, con más de diez años de experiencia en el sector de la seguridad, ha comercializado un portfolio de soluciones de seguridad que incluyen EDR, XDR, y seguridad web y en la nube. Apasionada por ayudar a las empresas a mejorar su madurez en materia de seguridad, Tsailing ha abogado por plataformas de ciberseguridad integradas, automatizadas y eficaces a lo largo de su carrera.