Acelere su viaje SSE. Únase a Netskope en RSA.

  • Servicio de seguridad Productos Edge

    Protéjase contra las amenazas avanzadas y en la nube y salvaguarde los datos en todos los vectores.

  • Borderless SD-WAN

    Proporcione con confianza un acceso seguro y de alto rendimiento a cada usuario remoto, dispositivo, sitio y nube.

  • Plataforma

    Visibilidad inigualable y protección contra amenazas y datos en tiempo real en la nube privada de seguridad más grande del mundo.

Netskope ha sido nombrado Líder en el Informe del Cuadrante Mágico de Gartner™ 2022 en SSE

Obtenga el informe Todos los productos
Líder SSE Netskope gartner mq 2022
Respuesta rápida de Gartner®: ¿Cómo afecta la adquisición de Netskope a los proyectos SD-WAN, SASE y SSE?

Obtenga el informe
Gartner quick answer
Netskope ofrece una estrategia de seguridad cloud moderna, con capacidades unificadas para los datos y protección frente a amenazas, además de un acceso privado seguro.

Explora nuestra plataforma
Vista aérea de una ciudad metropolitana
Cambie a los servicios de seguridad en la nube líderes del mercado con una latencia mínima y una alta fiabilidad.

Más información
Lighted highway through mountainside switchbacks
Prevenga las amenazas que a menudo eluden otras soluciones de seguridad utilizando un marco SSE de un solo paso.

Más información
Lighting storm over metropolitan area
Soluciones de confianza cero para implementaciones de SSE y SASE

Más información
Boat driving through open sea
Netskope hace posible un proceso seguro, rápido y con inteligencia cloud para la adopción de los servicios en la nube, las aplicaciones y la infraestructura de nube pública.

Más información
Wind turbines along cliffside
  • Nuestros clientes

    Netskope da servicio a más de 2.000 clientes en todo el mundo, entre los que se encuentran más de 25 de las 100 empresas de Fortune

  • Soluciones para clientes

    Le apoyamos en cada paso del camino, garantizando su éxito con Netskope.

  • Formación y certificación

    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube.

Ayudamos a nuestros clientes a estar preparados para cualquier situación

Ver nuestros clientes
Woman smiling with glasses looking out window
El talentoso y experimentado equipo de servicios profesionales de Netskope proporciona un enfoque prescriptivo para su exitosa implementación.

Más información
Servicios profesionales de Netskope
Asegure su viaje de transformación digital y aproveche al máximo sus aplicaciones en la nube, web y privadas con la capacitación de Netskope.

Más información
Group of young professionals working
  • Recursos

    Obtenga más información sobre cómo Netskope puede ayudarle a proteger su viaje hacia la nube.

  • Blog

    Descubra cómo Netskope permite la transformación de la seguridad y las redes a través del servicio de seguridad (SSE).

  • Eventos & Workshops

    Manténgase a la vanguardia de las últimas tendencias de seguridad y conéctese con sus pares.

  • Seguridad definida

    Todo lo que necesitas saber en nuestra enciclopedia de ciberseguridad.

Podcast Security Visionaries

Episodio 10: Construyendo relaciones de seguridad a través de la transparencia
In this episode, Mike and Andreas discuss aligning with works councils, forging business relationships through transparency, and embedding security into value streams.

Reproducir el pódcast
Building Security Relationships Through Transparency
Lea lo último sobre cómo Netskope puede hacer posible el viaje de confianza cero y SASE a través de las capacidades de SSE.

Lea el blog
Sunrise and cloudy sky
Netskope at RSA

Join Netskope at RSA Conference this year and be part of the real conversations on SASE and Zero Trust. Stop by our booth in South Hall, chat with an expert, register for our speaking sessions, and unwind by joining us at one of our events!

Más información
RSA logo
¿Qué es Security Service Edge (SSE)?

Explore el lado de la seguridad de SASE, el futuro de la red y la protección en la nube.

Más información
Four-way roundabout
  • Empresa

    Le ayudamos a mantenerse a la vanguardia de los desafíos de seguridad de la nube, los datos y la red.

  • Por qué Netskope

    La transformación de la nube y el trabajo desde cualquier lugar han cambiado la forma en que debe funcionar la seguridad.

  • Liderazgo

    Nuestro equipo de liderazgo está firmemente comprometido a hacer todo lo necesario para que nuestros clientes tengan éxito.

  • Partners

    Nos asociamos con líderes en seguridad para ayudarlo a asegurar su viaje a la nube.

Netskope posibilita el futuro del trabajo.

Descubra más
Curvy road through wooded area
Netskope está redefiniendo la seguridad de la nube, los datos y la red para ayudar a las organizaciones a aplicar los principios de Zero Trust para proteger los datos.

Más información
Switchback road atop a cliffside
Pensadores, constructores, soñadores, innovadores. Juntos, ofrecemos soluciones de seguridad en la nube de vanguardia para ayudar a nuestros clientes a proteger sus datos y usuarios.

Conozca a nuestro equipo
Group of hikers scaling a snowy mountain
La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.

Más información
Group of diverse young professionals smiling

The Torture of a Constantly Dripping Bucket

10 de diciembre de 2019

I cannot be alone in my frustration over the constant reports of data leakage from the cloud. It seems a day cannot go by without another incident being reported; yet none of them seems enough to serve as a rallying cry for change.  

The number and scale of leaks are both increasing, as is the potential impact on those affected (both the organizations leaking the data and those about whom the data pertains). The number and scale of leaks are both increasing, as is the potential impact on those affected (both the organizations leaking the data and those about whom the data pertains). Rather than determining whether a leak is worth media attention by the fame of the brand name concerned, the headlines should be paying more attention to the numbers and type of data involved.

Novaestrat, an Ecuadorian data analytics and marketing company, recently left an unsecured Elasticsearch server exposed, potentially compromising data on nearly 21 million individuals. This number includes duplicate records and obsolete entries but considering that the population of Ecuador is 16.6 million, that is a huge number!

Leaky AWS S3 buckets are probably the most common crime scene for unsecured data in the cloud and LionAir is the latest S3 exposure example. The company left an exposed AWS buckets containing personally identifiable information – including passport numbers – belonging to millions of passengers. Big names often lurk behind lesser known organizations within the supply chain for these incidents. In another recent example, data company Attunity left a trove of data belonging to Ford, Netflix and TD Bank in publicly accessible S3 buckets. 

I could go on and mention many more examples, but this exercise won’t answer the fundamental question: why do these incidents continue to happen?

The fourth Cloud Security Alliance Top Threats report (2019) shows that many of us are not blind to the risks. 241 industry experts place data breaches, misconfiguration of cloud infrastructure and a lack of cloud security architecture and strategy as the top three risks in cloud usage. Of course, not all enterprise cloud consumers are experts, but the majority of those responsible for cloud infrastructure are, at least, specialists. So, assuming that the risks of cloud threats are understood, I believe that too many organizations still do not completely understand the “shared responsibility” model. Shared responsibility establishes where the responsibility of the cloud service provider ends (security “of” the cloud), and where the responsibility of the customer begins (security “in” the cloud). A tiny preposition makes a huge difference! 

In an ideal world this model should be quite straightforward, but unfortunately, our world is far from ideal (and not only in terms of information security). Too many organizations ignore their duties relating to the  security of data “in” the cloud. Just this week, a new piece of research revealed that only 32% of organizations believe that protecting data in the cloud is their own responsibility. In many instances, this shared responsibility is further ‘clouded’ by the complexity of the supply chain, as we saw in the examples above. It is often the third party – rather than the data owners – that should have been enforcing all the necessary measures to secure the data “in” the cloud. Too often, there is a chain of implicit trust, misplaced with devastating consequences. These breaches become additional confirmation that the security of the supply chain should be a core element of a security strategy, and the cloud security strategy is no exception here.

User education plays an important role too in surmounting cloud security issues, but there are also multiple tools that can automate the policing of cloud use, and help educate users as they go. These tools are generally pretty straightforward; we have a predefined rule in our Continuous Security Assessment that states “Ensure S3 Bucket is not publicly accessible”, and we can prevent the ransacking of records on public Elasticsearch databases with a simple rule that alerts in case the TCP 9200 port is exposed so that the appropriate remediation actions can be easily enforced. This is a simple configuration that could have prevented a massive breach like the one that occurred in Ecuador, and demonstrates that sometimes the solutions are more straightforward than the initial problem appears.

Despite the speed at which organizations are now moving to the cloud, security mindsets and strategies (in a nutshell, the concept of perimeter) are still on-premise..This is the fault of both the organization as a whole and of individuals who continue to ignore the fact that misconfigurations in the cloud can potentially expose data to more than 3.2 billion people. In the past we used to implore people not to leave post-it notes on their monitors that would make a password visible to all their office colleagues. My sixth sense tells me that issue hasn’t gone away, but it now pales in comparison to the exposure of whole data sets left in publicly accessible cloud buckets, unprotected from any passer-by on the internet.

Organizations need to redefine the concept of data security in the cloud, enforcing security controls closer to the data and reimagining their perimeter in a way that is data-centric, cloud smart, and fast enough that it doesn’t prohibit productivity or innovation.

author image
Paolo Passeri
Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry. He is the mastermind behind hackmageddon.com, a blog detailing timelines and statistics of all the main cyber-attacks occurred since 2011. It is the primary source of data and trends of the threat landscape for the Infosec community.