Netskope est nommé leader dans le Magic Quadrant™ du Gartner 2022 dédié au Security Service Edge Recevoir le rapport

  • Produits

    Les produits Netskope sont conçus sur Netskope Security Cloud.

  • Plateforme

    Une visibilité inégalée et une protection des données et des menaces en temps réel sur le plus grand cloud privé de sécurité au monde.

Netskope reconnu comme un des leaders dans le rapport du Magic Quadrant™ 2022 du Gartner dédié au SSE

Recevoir le rapport Présentation des produits
Netskope gartner mq 2022 leader sse

Netskope offre une solution moderne de sécurité du cloud, dotée de fonctions unifiées en matière de protection des données et de détection des menaces, et d'un accès privé sécurisé.

Découvrir notre plateforme
Vue aérienne d'une métropole

Optez pour les meilleurs services de sécurité cloud du marché, avec un temps de latence minimum et une fiabilité élevée.

Plus d'informations
Lighted highway through mountainside switchbacks

Neutralisez les menaces qui échappent souvent à d'autres solutions de sécurité à l'aide d'un framework SSE unifié.

Plus d'informations
Lighting storm over metropolitan area

Solutions Zero Trust pour les déploiements du SSE et du SASE

Plus d'informations
Boat driving through open sea

Netskope permet à toutes les entreprises d'adopter des services et des applications cloud ainsi que des infrastructures cloud publiques rapidement et en toute sécurité.

Plus d'informations
Wind turbines along cliffside
  • Nos clients

    Netskope sert plus de 2 000 clients dans le monde, dont plus de 25 des entreprises du classement Fortune 100

  • Solutions pour les clients

    Nous sommes là pour vous et avec vous à chaque étape, pour assurer votre succès avec Netskope.

  • Formation et certification

    Avec Netskope, devenez un expert de la sécurité du cloud.

Nous parons nos clients à l'avenir, quel qu'il soit

Voir nos clients
Woman smiling with glasses looking out window

L’équipe de services professionnels talentueuse et expérimentée de Netskope propose une approche prescriptive pour une mise en œuvre réussie.

Plus d'informations
Netskope Professional Services

Sécurisez votre parcours de transformation numérique et tirez le meilleur parti de vos applications cloud, Web et privées grâce à la formation Netskope.

Plus d'informations
Group of young professionals working
  • Ressources

    Découvrez comment Netskope peut vous aider à sécuriser votre migration vers le Cloud.

  • Blog

    Découvrez comment Netskope permet de transformer la sécurité et les réseaux à l'aide du Security Service Edge (SSE).

  • Événements et ateliers

    Restez à l'affût des dernières tendances en matière de sécurité et créez des liens avec vos pairs.

  • Security Defined

    Tout ce que vous devez savoir dans notre encyclopédie de la cybersécurité.

Podcast Security Visionaries

Episode 15: Building Permanent Security Awareness

Écouter le podcast
Black man sitting in conference meeting

Découvrez comment Netskope permet de passer au Zero Trust et au modèle SASE grâce aux fonctions du Security Service Edge (SSE).

Lire le blog
Sunrise and cloudy sky

SASE Week

Netskope is positioned to help you begin your journey and discover where Security, Networking, and Zero Trust fit in the SASE world.

Plus d'informations
SASE Week

Qu'est-ce que le Security Service Edge ?

Découvrez le côté sécurité de SASE, l'avenir du réseau et de la protection dans le cloud.

Plus d'informations
Four-way roundabout
  • Entreprise

    Nous vous aidons à conserver une longueur d'avance sur les défis posés par le cloud, les données et les réseaux en matière de sécurité.

  • Pourquoi Netskope

    La transformation du cloud et le travail à distance ont révolutionné le fonctionnement de la sécurité.

  • Équipe de direction

    Nos dirigeants sont déterminés à faciliter la réussite de nos clients.

  • Partenaires

    Nous collaborons avec des leaders de la sécurité pour vous aider à sécuriser votre transition vers le cloud.

Netskope permet l'avenir du travail.

En savoir plus
Curvy road through wooded area

Netskope redéfinit la sécurité du cloud, des données et des réseaux afin d'aider les entreprises à appliquer les principes Zero Trust pour protéger leurs données.

Plus d'informations
Switchback road atop a cliffside

Penseurs, concepteurs, rêveurs, innovateurs. Ensemble, nous fournissons le nec plus ultra des solutions de sécurité cloud afin d'aider nos clients à protéger leurs données et leurs collaborateurs.

Rencontrez notre équipe
Group of hikers scaling a snowy mountain

La stratégie de commercialisation de Netskope privilégie ses partenaires, ce qui leur permet de maximiser leur croissance et leur rentabilité, tout en transformant la sécurité des entreprises.

Plus d'informations
Group of diverse young professionals smiling

6 Key Considerations for Selecting a Zero Trust Network Access (ZTNA) Solution

Jul 26 2022

Zero trust network access (ZTNA) has become a hot topic and a popular IT project. Here are some of the reasons why:   

First, organizations are beginning to pursue a zero trust strategy and ZTNA is the first logical step towards a zero trust security program. Second, remote or hybrid work is here to stay. And as a result, now is the time to replace your legacy remote access VPN with a modern anywhere secure access solution for the long term. Third, digital transformation and cloud-first strategies continue to evolve and legacy access methods are not well suited for the cloud environment.  

Regardless of the motivation behind zero trust network access initiative, creating a short list of ZTNA solutions to evaluate in a crowded market can be daunting. Last time I checked, there were 42 vendors listed in Gartner’s market guide for ZTNA. 

But, not all ZTNA solutions are created equally, so here are some considerations to help you narrow down your list.  

1. Platform matters.

Whether you are selecting and implementing ZTNA for remote/ hybrid work, starting an initial project on a bigger zero trust security journey, or you have a fully mapped out vision for security service edge (SSE) and secure access service edge (SASE) architecture, it is best to work with a vendor with a full SSE platform with a single agent, single console, and single policy engine, and support for a multi-cloud environment. 

Like most organizations, yours is probably operating in a hybrid cloud, or multi-cloud environment with a mix of applications hosted in private data centers and public cloud environments, as well as using cloud applications (or SaaS).  

I am also willing to bet that your current environment is subject to change. For example, you might have an active project to transform your on-premises enterprise resource planning (ERP) system to be hosted in a cloud environment, or to adopt Cloud-ERP.  

An integrated SSE platform helps you deliver a seamless zero trust application access with consistent policy controls and a great user experience regardless of where the applications are hosted.  

Gartner estimates that “By 2025, 70% of organizations that implement agent-based zero trust network access (ZTNA) will choose a security service edge (SSE) provider for ZTNA, rather than a stand-alone offering, up from 20% in 2021.”*

2. Enable hybrid work from anywhere.

To enable hybrid work from anywhere, coverage and performance are critical.   It’s important to select a vendor that has a footprint that can match your global expansion plans and increase enterprise agility. Ensure that you work with a ZTNA provider that has data centers in all major geographic locations where your employees may be connecting. Your vendor selection should not solely be based on counting data centers but choosing one that has the full security stack available in every region—with full compute at the edge close to your users—with low-latency on-ramps combined with extensive peering for the best experience.  

Work with a vendor who’s services are backed by Service Level Agreements (SLAs) that provide critical commitments around uptime/availability and performance, as tools for ensuring a superior end-to-end user and application experience. For example Netskope Digital Experience Management (DEM) provides critical monitoring of all user traffic with actionable insights into network and application performance, addressing web, cloud, SaaS, as well as private applications being accessed via ZTNA.

3. Protect data everywhere. 

Your ZTNA solution should detect data usage, activities, and behavior anomalies (UEBA), enforce advanced DLP rules and policies, and apply adaptive access policy based on user risks.

ZTNA securely connects users to private applications and resources. Often these resources are the crown jewels of the organization, from engineering code to other forms of proprietary data such as trade secrets. Select a solution that provides multiple options for data protection to help your organization protect sensitive information. For example, a modern ZTNA solution should provide options to inspect traffic and apply DLP rules and policies to protect data. However, some organizations may prefer UEBA and user risk ratings to gain real-time context to minimize insider risks without decrypting traffic. 

4. Easy-to-set policies.

In addition to having a single agent, with a truly integrated SSE platform, you will only need to configure the identity and directory service once using a unified console.  Similarly, with a centralized DLP engine, you only need to define it once and the DLP rules and policy will be enforced across the platform.   You will gain the benefits of enabling access to cloud, and private applications in just a few days to better support M&A and other time-sensitive activities. Don’t get stuck with an application VPN and complex firewall rules masquerading as ZTNA.  

5. Effective third-party integration.

With the right integrations and exchanges in multi-vendor environments, ZTNA can thrive. The best exchanges offer user and device trust scores that are normalized across the environment and can trigger adaptive access controls, user group settings, and automated workflow ticketing for investigation. For example, through a tight integration with third-party directory services, your ZTNA solution should reflect user risk score in real time, apply adaptive access policy, including rescind access if users are no longer authorized (ie. left the organization).

6. Future proof your plan. 

The ZTNA market is in flux, and industry experts expect that in the next three years, this space will go through a major consolidation. As mentioned earlier, your environment is also changing. Digital transformation is a journey and your zero trust implementation is also a journey. As I have discussed in my previous blog, it is important to understand your use cases today, and your organization’s vision and future plans.  

In addition to selecting a vendor with staying power, you also want to compare your internal plans with the vendor’s vision and road map and ensure they are aligned.

Final thoughts 

Remember that zero trust does NOT mean to “trust no one”. In order to enable business, you have to extend access (trust). The key to leveraging zero trust principles across your organization, whether specifically with ZTNA or otherwise, is to use technology to make better, context-aware decisions about trust and access for a given user and to continuously monitor and adapt to mitigate risks. This context is based on a number of factors, such as user role and identity, device identity, security posture, app type, app risk, and app instance, plus the sensitivity level of the data. Contextual decisions result in robust access policies that are risk-optimized, and can uniformly be applied across the cloud, web, and private apps, while enabling business agility and user productivity. 

Enterprises are rapidly adopting security service edge (SSE) capabilities to securely enable the benefits of a SASE architecture. A critical piece of SSE is a zero trust network access (ZTNA) solution that enables application-specific connectivity for users anywhere. Security Service Edge supports the consolidation of security functions, a lower total cost of ownership, and improves operational efficiency in the long term, leading to better overall security. 

Learn more about the Netskope ZTNA solution, Netskope Private Access, here   

* Gartner “Market Guide for Zero Trust Network Access, ”   Aaron McQuaid, Neil MacDonald, John Watts, Feb 17, 2022

*Gartner, “Magic Quadrant for Security Service Edge,” John Watts, Craig Lawson, Charlie Winckless, Aaron McQuaid, February 15, 2022

Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Netskope.

author image
Tsailing Merrem
Tsailing Merrem is the Director of Product Marketing for Netskope. Tsailing is responsible for evangelizing Zero Trust Network Access (ZTNA) technology, and with more than ten years of experience in the security industry, she has marketed for a portfolio of security solutions including EDR, XDR, web, and cloud security. Passionate about helping businesses improve their security maturity, Tsailing has advocated for integrated, automated, and effective cyber security platforms throughout her career.