¡Únase a nosotros en SASE Summit de Netskope, llegando a una ciudad cerca de usted! Regístrese ahora

  • Servicio de seguridad Productos Edge

    Protéjase contra las amenazas avanzadas y en la nube y salvaguarde los datos en todos los vectores.

  • Borderless SD-WAN

    Proporcione con confianza un acceso seguro y de alto rendimiento a cada usuario remoto, dispositivo, sitio y nube.

  • Plataforma

    Visibilidad inigualable y protección contra amenazas y datos en tiempo real en la nube privada de seguridad más grande del mundo.

La plataforma del futuro es Netskope

Intelligent Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG) y Private Access for ZTNA integrados de forma nativa en una única solución para ayudar a todas las empresas en su camino hacia el Servicio de acceso seguro Arquitectura perimetral (SASE).

Todos los productos
Vídeo de Netskope
Borderless SD-WAN: el comienzo de la nueva era de la empresa sin fronteras

Netskope Borderless SD-WAN offers an architecture that converges zero trust principles and assured application performance to provide unprecedented secure, high-performance connectivity for every site, cloud, remote user, and IoT device.

Read the article
Borderless SD-WAN
Netskope ofrece una estrategia de seguridad cloud moderna, con capacidades unificadas para los datos y protección frente a amenazas, además de un acceso privado seguro.

Explora nuestra plataforma
Vista aérea de una ciudad metropolitana
Cambie a los servicios de seguridad en la nube líderes del mercado con una latencia mínima y una alta fiabilidad.

Más información sobre NewEdge
Lighted highway through mountainside switchbacks
Habilite de forma segura el uso de aplicaciones de IA generativa con control de acceso a aplicaciones, capacitación de usuarios en tiempo real y la mejor protección de datos de su clase.

Descubra cómo aseguramos el uso generativo de IA
Safely Enable ChatGPT and Generative AI
Soluciones de confianza cero para implementaciones de SSE y SASE

Learn about Zero Trust
Boat driving through open sea
Netskope hace posible un proceso seguro, rápido y con inteligencia cloud para la adopción de los servicios en la nube, las aplicaciones y la infraestructura de nube pública.

Learn about Industry Solutions
Wind turbines along cliffside
  • Nuestros clientes

    Netskope da servicio a más de 2.000 clientes en todo el mundo, entre los que se encuentran más de 25 de las 100 empresas de Fortune

  • Soluciones para clientes

    Le apoyamos en cada paso del camino, garantizando su éxito con Netskope.

  • Formación y certificación

    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube.

Ayudamos a nuestros clientes a estar preparados para cualquier situación

Ver nuestros clientes
Woman smiling with glasses looking out window
El talentoso y experimentado equipo de servicios profesionales de Netskope proporciona un enfoque prescriptivo para su exitosa implementación.

Learn about Professional Services
Servicios profesionales de Netskope
Asegure su viaje de transformación digital y aproveche al máximo sus aplicaciones en la nube, web y privadas con la capacitación de Netskope.

Learn about Training and Certifications
Group of young professionals working
  • Recursos

    Obtenga más información sobre cómo Netskope puede ayudarle a proteger su viaje hacia la nube.

  • Blog

    Descubra cómo Netskope permite la transformación de la seguridad y las redes a través del servicio de seguridad (SSE).

  • Eventos & Workshops

    Manténgase a la vanguardia de las últimas tendencias de seguridad y conéctese con sus pares.

  • Seguridad definida

    Todo lo que necesitas saber en nuestra enciclopedia de ciberseguridad.

Podcast Security Visionaries

Episodio de bonificación 2: El cuadrante mágico para SSE y obtener SASE correctamente
Mike y Steve analizan el Gartner® Magic Quadrant™ para Security Service Edge (SSE), el posicionamiento de Netskope y cómo el clima económico actual afectará el viaje de SASE.

Reproducir el pódcast
Episodio de bonificación 2: El cuadrante mágico para SSE y obtener SASE correctamente
Últimos blogs

Cómo Netskope puede habilitar el viaje de Zero Trust y SASE a través de las capacidades del borde del servicio de seguridad (SSE).

Lea el blog
Sunrise and cloudy sky
Gira mundial del día de inmersión en AWS de Netskope 2023

Netskope ha desarrollado una variedad de laboratorios prácticos, talleres, seminarios web detallados y demostraciones para educar y ayudar a los clientes de AWS en el uso y la implementación de los productos de Netskope.

Learn about AWS Immersion Day
Socio de AWS
¿Qué es Security Service Edge (SSE)?

Explore el lado de la seguridad de SASE, el futuro de la red y la protección en la nube.

Learn about Security Service Edge
Four-way roundabout
  • Empresa

    Le ayudamos a mantenerse a la vanguardia de los desafíos de seguridad de la nube, los datos y la red.

  • Por qué Netskope

    La transformación de la nube y el trabajo desde cualquier lugar han cambiado la forma en que debe funcionar la seguridad.

  • Liderazgo

    Nuestro equipo de liderazgo está firmemente comprometido a hacer todo lo necesario para que nuestros clientes tengan éxito.

  • Partners

    Nos asociamos con líderes en seguridad para ayudarlo a asegurar su viaje a la nube.

Apoyar la sostenibilidad a través de la seguridad de los datos

Netskope se enorgullece de participar en Vision 2045: una iniciativa destinada a crear conciencia sobre el papel de la industria privada en la sostenibilidad.

Descubra más
Supporting Sustainability Through Data Security
La más Alta en Ejecución. Más Avanzada en Visión.

Netskope ha sido reconocido como Líder en el Gartner® Magic Quadrant™ de 2023 en SSE.

Obtenga el informe
Netskope ha sido reconocido como Líder en el Gartner® Magic Quadrant™ de 2023 en SSE.
Pensadores, constructores, soñadores, innovadores. Juntos, ofrecemos soluciones de seguridad en la nube de vanguardia para ayudar a nuestros clientes a proteger sus datos y usuarios.

Conozca a nuestro equipo
Group of hikers scaling a snowy mountain
La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.

Learn about Netskope Partners
Group of diverse young professionals smiling

Security for the “cloud everything” era

Jun 06 2017
Etiquetas
Cloud Best Practices
Cloud Security
How Netskope Works
Netskope Announcements

As you read in Sanjay’s blog post, we are excited to announce that we closed a $100 million series E funding round. This is awesome news for the team here at Netskope, because this new funding is the critical fuel that we will use to continue building the Netskope cloud security platform. We believe that a new approach is needed to solve the challenges that enterprise are facing with the rapid adoption of the cloud. One such challenge is the security risk posed by the increasingly blurred lines between cloud and web.

Netskope was founded with the belief that the far-reaching impact of the cloud would require a fundamentally new approach to security. To that end, we built our solution with a few key tenets in mind:

  • The first is that organizations would, wittingly or unwittingly, use many cloud services, and only a few of them would be administered centrally by IT.
  • The second is that people would access those apps from everywhere, on a multitude of devices.
  • And the third is that, rather than block apps outright, IT would prefer to govern what people do in them.

Those tenets drove our architectural choices, and are the source of our differentiation in the market. Let’s look at some of these drivers in a little more detail.

An Explosion of Cloud and the Unsanctioned Cloud

Netskope has done thousands of cloud risk assessments. Data from these risk assessments show that over one thousand cloud applications are in use at a typical enterprise. What’s important to note is that while IT may have sanctioned a few dozen (at most) of these cloud applications, the rest are driven by business units or teams being unshackled from the restrictions of an IT procurement and deployment process. Every employee in the enterprise may also choose to adopt their own preferred cloud app; often taking advantage of the freemium model of many cloud apps to get their work done. A lot of times it is hard for IT to distinguish between the enterprise sanctioned and the employee adopted instances of the same cloud app.  

Teams within an enterprise are rapidly adopting IaaS or PaaS solutions to build their own applications without waiting for IT to procure, deploy and manage the infrastructure needed to support these applications.   

Each one of these unsanctioned SaaS or custom applications built on IaaS or PaaS infrastructure use public or private APIs that are opaque to legacy security solutions. The ramifications of an API call may not be clear from the context gleaned from just looking at the network traffic.   A modern security solution needs to understand these API calls in order to address the risks created by this explosion of cloud services.

Anywhere Access

Enterprise users today expect to be able to access their collaboration or business critical applications from anywhere, at any time and from any device. Being at work is no longer defined by the location of the employee but is a function of their activities. Work is not a place you go, it’s a thing you do. Work may involve not just using a traditional desktop or even a laptop but also a mobile device like a smartphone or a tablet. And the data may be accessed from not just a browser but an app or a sync client.    

Legacy solutions are unable to glean the context of the user activities from the use of cloud services from modern devices and with modern access methods. Why is that? In a typical cloud transaction, API calls may be pipelined as well as multiplexed over HTTP/S. What that means in layman’s terms is that you cannot just look at the first few bytes of a connection or even the entirety of a single HTTP connection, but have to stitch together activities that may occur within a connection as well as across connections to be able to correctly interpret the end result.

Safely Enable — Don’t Block

Enterprises need to allow all access to sanctioned cloud applications and business related usage of corporate data while protecting against data exfiltration and the infiltration of malware.   

Cloud is an unsecured channel at a typical enterprise,  where legacy solutions take an allow or block approach to cloud usage.   New blended threats use this knowledge to infiltrate an Enterprise by using a combination of web and cloud services.

Enterprises also need the ability to distinguish between instances of cloud applications to be able to ensure that corporate data is used in compliance with policy and regulatory frameworks.  

We have talked about our approach to this extensively in blog posts like this.

The blurring line between cloud and web

It is getting harder and harder to distinguish between cloud and web. A web page today is dynamic, a composite formed from many API calls to many other cloud and web services. A page may load ads from one service, static images from another, let readers share content on social media and may allow comments through an integrated forum. Is this a cloud app or a dynamic web page? We believe that this is an artificial distinction that will quickly fade away. Enterprises need a modern security solution that spans both cloud and web and is able to distil all of the dynamic content and API calls that are occurring and provide actionable security context.

The Netskope Approach

The Netskope cloud security platform is the right platform to protect the enterprise by providing:

Comprehensive coverage: Ability to secure sanctioned SaaS applications, social media applications, unsanctioned cloud apps, cloud infrastructure services and, later this year, web activity  

Context driven: Deep understanding of APIs, ability to dynamically parse unpublished APIs across known as well as unfamiliar services to accurately identify context and content of user activity across both cloud and web.

Unified Policy: Single policy engine that enables clear configuration and consistent enforcement across managed/unmanaged devices, on-premises and remote user access

Protección Avanzada contra Amenazas: Robust threat prevention that spans cloud and web with multiple threat detection engines, proprietary threat intelligence powered by , and unique third party integrations


Advanced Data Loss Prevention: Protection against sensitive data loss across all cloud and web usage

A Security Platform that Evolves with the Ever-changing Way that People Work

Cloud adoption is an unstoppable force and continues to dominate the mindshare of enterprise CIOs and CISOs. The exponential growth of the cloud has upended the central tenets of the security industry — the network perimeter and IT control of end-user applications.

All enterprises recognize the need to modernize their security policies for the cloud but are struggling to find the right security approach that addresses all their cloud security needs. There are a plethora of security vendors that claim to address some of the challenges resulting from this broad cloud adoption but each of them focuses on a particular silo and misses the bigger picture.

Security leaders need to take a cloud first approach when looking at the right security solutions for their enterprise in a way that fits with how people actually work today. Cloud security solutions that work enable security teams to take a nuanced approach to understanding, safely enabling and controlling enterprise data without slowing the adoption of the cloud, while providing the context needed to act quickly and decisively.

Stay tuned for more exciting news as we continue our journey to provide comprehensive security for the enterprise in a cloud-first world.