cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Ponte manos a la obra con la plataforma Netskope
          Esta es su oportunidad de experimentar de primera mano la Netskope One plataforma de una sola nube. Regístrese para participar en laboratorios prácticos a su propio ritmo, únase a nosotros para una demostración mensual del producto en vivo, realice una prueba de manejo gratuita de Netskope Private Accesso únase a nosotros para talleres en vivo dirigidos por instructores.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope debuta como Líder en el Cuadrante Mágico™ de Gartner® para Single-Vendor SASE
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Descubra cómo su organización puede equilibrar el potencial innovador de la IA generativa con sólidas prácticas de seguridad de Datos.
                Prevención de pérdida de datos (DLP) moderna para dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Obtenga consejos y trucos para la transición a una DLP entregada en la nube.
                  Libro SD-WAN moderno para principiantes de SASE
                  SD-WAN moderna para maniquíes SASE
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforma la forma en que los equipos de operaciones de seguridad aplican los conocimientos basados en datos para implementar una mejor política. Con Advanced Analytics, puede identificar tendencias, concentrarse en las áreas de preocupación y usar los datos para tomar medidas.
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Netskope One Private Access es la única solución que le permite retirar su VPN para siempre.
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                            Netskope GovCloud
                            Netskope logra la alta autorización FedRAMP
                            Elija Netskope GovCloud para acelerar la transformación de su agencia.
                              Hagamos grandes cosas juntos
                              La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.
                                Soluciones Netskope
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) proporciona a los clientes potentes herramientas de integración para aprovechar las inversiones en su postura de seguridad.
                                  Soporte técnico Netskope
                                  Soporte técnico Netskope
                                  Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                                    Vídeo de Netskope
                                    Netskope Training
                                    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                                      Did security issues temper cloud momentum in 2014?

                                      Dec 30 2014
                                      Tags
                                      Cloud Security

                                      According to the Chinese zodiac, 2014 was the Year of the Horse.  If Enterprise IT had a yearly zodiac, it would surely be the Year of the Cloud.  Cloud computing has been front and center as an IT topic for well more than a decade, but 2014 in particular seemed to pick up more steam compared to recent years:

                                      With the rash of well-publicized security breaches from Shellshock to Heartbleed, you might argue that security issues tempered cloud-computing momentum in 2014.  The folks over at Information is Beautiful have a nice interactive visualization of the data breaches and hacks over the past decade and 2014 is chock-full of big events.

                                      Data Breaches 2014

                                      There are two forces that seem to be at odds here.  Cloud growth appears to be exploding and at the same time, security breaches and hacks also appear to be on the rise.  Is this is a matter of the more you increase use, the more vulnerable you will be?  If only we had research to back this up.  In fact we do! The Ponemon Institute recently conducted a Netskope-sponsored study, “Cloud Multiplier Effect On the Cost of a Data Breach” and found that IT folks believe that changing cloud app usage in the enterprise increases the probability of a data breach.

                                      That takes us back to the original question.  Did security issues temper cloud momentum in 2014?  Perhaps cloud adoption could have grown even more if there were fewer security breaches?  It looks like there are three options to limiting your exposure to security breaches.

                                      Option#1 – Don’t use the cloud

                                      Forego the cloud altogether and stick to on-premise.  Block all your users from access to cloud services.  Good luck competing in this world of elastic deployments and productive employees with anytime access to applications on any device.  Besides, who is to say that on-premise is more secure?  Security breaches and hacking is not limited to the cloud.

                                      Option #2 – Use the cloud less

                                      Given the findings in the Ponemon study, perhaps another option is to use the cloud in limited scope and only when absolutely necessary.  The less you use it, the more secure you will be, right?  This may be true, but once again, you are also reducing the potential value you are getting from cloud services.  Besides, using the cloud less is actually very difficult in the Shadow IT era where your users are going to adopt the cloud regardless of what IT sanctions.   Similar to option #1 you could perhaps block cloud applications for users, but once again, impacting user productivity is not a direction too many folks would recommend.

                                      Option #3 – Use the cloud more, but better prepare and equip

                                      What if you fully embrace the cloud, but limit your exposure to security issues by properly equipping yourself with solutions (www.netskope.com) that will help you move to the cloud safely? From identifying all cloud apps in use and understanding what the risk is to adopting fine-grained policy controls to ensure that data and usage is secure.   Don’t block all cloud apps, only the ones that are risky and perhaps only certain activities and certain content types and maybe on certain devices.  You get to have your cake (the cloud) and eat it too (limit security risk).

                                      Speaking of better preparing yourself when adopting the cloud, Netskope’s quarterly cloud reports in 2014 unveiled some interesting stats around cloud usage.  This data could be useful in helping you properly prepare for your cloud deployments.  Below is a summary of the key findings in 2014 along with links to each report.

                                      2014 Cloud Report Findings

                                      • Cloud adoption climbed from 397 cloud apps per enterprise at the beginning of the year to 579 apps at the end of the year
                                      • Enterprises use 10 times the number of cloud apps than IT thinks they do
                                      • More than 88% of cloud apps are not enterprise-ready
                                      • More than 90% of organizations admit losing control of sensitive content in cloud file-sharing apps
                                      • There are three shares for every one upload in cloud storage apps
                                      • More than one-third of all cloud data leakage policy violations occur on mobile devices
                                      • Download, edit, and upload are among top 5 policy violations in cloud apps, pointing to both concerns over data leakage and compliance

                                      Netskope Cloud Reports – 2014

                                      January 2014 – Reality vs. Perception: More Cloud Apps Than You Realize 

                                      April 2014 – Upload and Edit are Most Common Causes of Policy Violations 

                                      July 2014 – Sharing is Alive and Well in Cloud Apps 

                                      October 2014 – Mobile and Cloud:  BFFs 4EVER 

                                      author image
                                      Bob Gilbert
                                      As Vice President of Strategy and Chief Evangelist at Netskope, Bob is dedicated to helping clients transform their security and networking infrastructure.
                                      As Vice President of Strategy and Chief Evangelist at Netskope, Bob is dedicated to helping clients transform their security and networking infrastructure.

                                      ¡Mantente informado!

                                      Suscríbase para recibir lo último del blog de Netskope