Netskope vuelve a ser reconocido como Líder en el Cuadrante™ Mágico de Gartner® para plataformas SASE. Obtener el Informe

cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Ponte manos a la obra con la plataforma Netskope
          Esta es su oportunidad de experimentar de primera mano la Netskope One plataforma de una sola nube. Regístrese para participar en laboratorios prácticos a su propio ritmo, únase a nosotros para una demostración mensual del producto en vivo, realice una prueba de manejo gratuita de Netskope Private Accesso únase a nosotros para talleres en vivo dirigidos por instructores.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope ha sido reconocido como Líder con mayor visión tanto en plataformas SSE como SASE
            2X líder en el Cuadrante Mágico de Gartner® para SASE Plataforma
            Una plataforma unificada creada para tu viaje
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Descubra cómo su organización puede equilibrar el potencial innovador de la IA generativa con sólidas prácticas de seguridad de Datos.
                Prevención de pérdida de datos (DLP) moderna para dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Obtenga consejos y trucos para la transición a una DLP entregada en la nube.
                  Libro SD-WAN moderno para principiantes de SASE
                  SD-WAN moderna para maniquíes SASE
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforma la forma en que los equipos de operaciones de seguridad aplican los conocimientos basados en datos para implementar una mejor política. Con Advanced Analytics, puede identificar tendencias, concentrarse en las áreas de preocupación y usar los datos para tomar medidas.
                        Soporte técnico Netskope
                        Soporte técnico Netskope
                        Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                          Vídeo de Netskope
                          Netskope Training
                          La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                            The UK’s NCSC Cyber Essentials Zero Trust Update: Explained

                            Feb 07 2023

                            Late in January this year, the UK’s National Cyber Security Centre announced an update to its Cyber Essentials scheme in order to ensure it “continues to help UK organisations guard against the most common cyber threats”. This year’s update isn’t an overhaul on the same scale as last year’s, but it did include important new guidance about zero trust architectures. You can see more detail here, but in essence, the April 2023 updates confirm that Cyber Essentials certification requirements are completely aligned with a zero trust architecture (as understood and explained by the NCSC here.) 

                            Why Change?

                            I was particularly pleased to see this update, and the language that explains the rationale for supporting a zero trust architectural approach is notable:

                            “…many organisations are embracing flexible working, which means lots of different device types may connect to your systems from many locations….it’s also increasingly common for organisations to share data with their partners and guest users, which requires more granular access control policies….Zero trust architecture is designed to cope with these changing conditions by enabling an improved user experience for remote access and data sharing.”

                            NIST defines zero trust as: “ the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.”

                            Why Now?

                            Gartner currently estimates that just 10% of large enterprises will have a mature and measurable zero-trust programme in place by 2026—that’s only an increase of 1% compared to today. And Gartner VP John Watts explains why zero trust is important:

                            “Many organisations established their infrastructure with implicit rather than explicit trust models to ease access and operations for workers and workloads. Attackers abuse this implicit trust in infrastructure to establish malware and then move laterally to achieve their objectives”.

                            This implicit trust is prevalent, with many organisations designing exceptions within their security policy for “trusted” cloud applications such as Microsoft 365. They often do this when their legacy security architecture causes user experience problems when it relies on physical appliances and long-winded routing maps. I posted about this last year, and the Netskope Threat Lab’s annual report proved my point when it showed that in 2022, 30% of all cloud malware downloads originated from Microsoft OneDrive. We should never implicitly trust applications, users or network connections when designing security policy. 

                            And yet “zero trust” isn’t a panacea either—in fact Gartner makes it clear that those ever innovative cyber criminals are setting their eyes on targets that are not (or cannot be) covered by zero trust controls. However, as part of a robust security strategy, technology solutions such as zero trust network access (ZTNA) are certainly some of the most useful tools that security professionals can start to implement today. 

                            Why Netskope?

                            Netskope holds the NCSC’s advanced “Cyber Essentials Plus” certification, so we know these guidelines and know what is required to comply. On top of that, we happen to be world experts in zero trust—handy.

                            Netskope helps organisations deliver zero trust across all four transformation stages of networking, security, applications, and data with a unified SASE-ready security service edge (SSE) platform. We do this by enabling context-driven, correctly-privileged access to both private and public applications.

                            We get excellent feedback from our customers (click the link and search for “zero trust” feedback). Here are a few examples:

                            • “Netskope is playing a significant role in our organisation reaching our zero-trust security goals”
                            • “Netskope is an important step towards zero trust for our company”
                            • “Netskope allows for the enablement of our Zero Trust strategy”

                            We would love to have a conversation with you about how we can support your efforts to implement zero trust, or achieve Cyber Essentials certification. Take a look at our eBook; How to Apply Zero Trust Principles the Right Way, for more thoughts on this.

                            author image
                            Neil Thacker
                            Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union GDPR.
                            Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union GDPR.
                            Conéctese con Netskope

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.