Obtén el informe: Como lograr alinear a CIOs y CEOs en la era de la IA

cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
Descubra Netskope
Ponte manos a la obra con la plataforma Netskope
Esta es su oportunidad de experimentar de primera mano la Netskope One plataforma de una sola nube. Regístrese para participar en laboratorios prácticos a su propio ritmo, únase a nosotros para una demostración mensual del producto en vivo, realice una prueba de manejo gratuita de Netskope Private Accesso únase a nosotros para talleres en vivo dirigidos por instructores.
Líder en SSE. Ahora es líder en SASE de un solo proveedor.
Netskope ha sido reconocido como Líder con mayor visión tanto en plataformas SSE como SASE
2X líder en el Cuadrante Mágico de Gartner® para SASE Plataforma
Una plataforma unificada creada para tu viaje
Protección de la IA generativa para principiantes
Protección de la IA generativa para principiantes
Descubra cómo su organización puede equilibrar el potencial innovador de la IA generativa con sólidas prácticas de seguridad de Datos.
Prevención de pérdida de datos (DLP) moderna para dummies eBook
Prevención moderna de pérdida de datos (DLP) para Dummies
Obtenga consejos y trucos para la transición a una DLP entregada en la nube.
Libro SD-WAN moderno para principiantes de SASE
SD-WAN moderna para maniquíes SASE
Deje de ponerse al día con su arquitectura de red
Entendiendo dónde está el riesgo
Advanced Analytics transforma la forma en que los equipos de operaciones de seguridad aplican los conocimientos basados en datos para implementar una mejor política. Con Advanced Analytics, puede identificar tendencias, concentrarse en las áreas de preocupación y usar los datos para tomar medidas.
Soporte técnico Netskope
Soporte técnico Netskope
Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
Vídeo de Netskope
Netskope Training
La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

The Right Steps to SASE: Place Core Inspection Points Between Users and Apps

Jun 03 2021

The following is an excerpt from Netskope’s recent book Designing a SASE Architecture for Dummies. This is the third in a series of seven posts detailing a set of incremental steps for implementing a well-functioning SASE architecture.

With a Next Generation Secure Web Gateway (NG-SWG) firmly in place and your visibility into all your traffic dramatically increased, one thing is certain: You may not like what you see next.

Are your people using Microsoft Office 365? Salesforce? Workday? Box? The answer is almost certainly, yes. But how big and how mature is that cloud environment beyond your security perimeter and outside of what you can easily see? Just how much of your organization’s data is running around out there, unchecked?

For the first time, your organization will be aware of just how at-risk it has been. You’ll see the flow of data, some of which may be particularly sensitive, among unsecured sites, services, and apps.

Now you have a truthful, and likely worrying, picture of where your organization stands with respect to its dependence on the cloud environment. So many apps and services, so few effective security controls. Until now.

As we explain throughout Designing a SASE Architecture for Dummies, NG-SWG establishes a single-pass, funnel-like, core inspection point for all your traffic in the cloud and in the data center. That core inspection point is better than your old perimeter — way, way better.

Remember, whether it’s the result of Shadow IT that’s been knowingly ignored or a more deliberate process of business digitalization, your old and outmoded security systems have been blind to the details. By replacing old SWG and similar appliances, you’ll finally have complete visibility into who’s using non-enterprise-grade applications/services, and what enterprise data is being sent “out there” beyond your control. NG-SWG and its new inspection points in the cloud let you see what’s going on inside all that traffic, as shown in the table below, managed software as a service (SaaS), Shadow IT apps, public cloud services, and custom apps in the public cloud.

Out with the OldIn with NG-SWGNetskope NG-SWG Integrates with . . .
Legacy SWG — only yes/no to web traffic.Deep inspection of all traffic: web, managed SaaS, shadow IT apps, public cloud services, and custom apps in the public cloud.Single sign-on solution (SSO)
Secure Sockets Layer (SSL) appliance.SSL/Transport Layer Security (TLS) decryption is performed in the cloud at cloud-scale with no appliances required.
Legacy cloud access security broker (CASB) monitors only managed apps that provided application programming interfaces (APIs).Monitors managed apps plus the unmanaged apps that don’t offer APIs; also sees what data is being used with apps, services, and websites.

If you’d like to read the complete Designing a SASE Architecture for Dummies book, you can download a complimentary copy here!

author image
Chad Berndtson
Chad Berndtson is global head of content and communications at Netskope. He joined the team in 2020 following several years building successful content, communications, and social media teams at Palo Alto Networks, Tanium, and Fortinet. Earlier in his career, Chad was a technology journalist focused on networking, security, and other IT topics at the dawn of the cloud era.
Chad Berndtson is global head of content and communications at Netskope. He joined the team in 2020 following several years building successful content, communications, and social media teams at Palo Alto Networks, Tanium, and Fortinet. Earlier in his career, Chad was a technology journalist focused on networking, security, and other…
Conéctese con Netskope

Subscribe to the Netskope Blog

Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.