Netskope est nommé leader dans le Magic Quadrant™ du Gartner 2022 dédié au Security Service Edge Recevoir le rapport

  • Produits de périphérie du service de sécurité

    Protégez-vous contre les menaces avancées et compatibles avec le cloud et protégez les données sur tous les vecteurs.

  • Borderless SD-WAN

    Fournissez en toute confiance un accès sécurisé et performant à chaque utilisateur, appareil, site et cloud distant.

  • Plateforme

    Une visibilité inégalée et une protection des données et des menaces en temps réel sur le plus grand cloud privé de sécurité au monde.

Netskope reconnu comme un des leaders dans le rapport du Magic Quadrant™ 2022 du Gartner dédié au SSE

Recevoir le rapport Présentation des produits
Netskope gartner mq 2022 leader sse

Réponse rapide de Gartner® : Quel est l'impact de l'acquisition d'Infiot par Netskope sur les projets SD-WAN, SASE et SSE ?

Recevoir le rapport
Réponse rapide : Quel est l’impact de l’acquisition d’Infiot par Netskope sur les projets SD-WAN, SASE et SSE ?

Netskope offre une solution moderne de sécurité du cloud, dotée de fonctions unifiées en matière de protection des données et de détection des menaces, et d'un accès privé sécurisé.

Découvrir notre plateforme
Vue aérienne d'une métropole

Optez pour les meilleurs services de sécurité cloud du marché, avec un temps de latence minimum et une fiabilité élevée.

Plus d'informations
Lighted highway through mountainside switchbacks

Neutralisez les menaces qui échappent souvent à d'autres solutions de sécurité à l'aide d'un framework SSE unifié.

Plus d'informations
Lighting storm over metropolitan area

Solutions Zero Trust pour les déploiements du SSE et du SASE

Plus d'informations
Boat driving through open sea

Netskope permet à toutes les entreprises d'adopter des services et des applications cloud ainsi que des infrastructures cloud publiques rapidement et en toute sécurité.

Plus d'informations
Wind turbines along cliffside
  • Nos clients

    Netskope sert plus de 2 000 clients dans le monde, dont plus de 25 des entreprises du classement Fortune 100

  • Solutions pour les clients

    Nous sommes là pour vous et avec vous à chaque étape, pour assurer votre succès avec Netskope.

  • Formation et certification

    Avec Netskope, devenez un expert de la sécurité du cloud.

Nous parons nos clients à l'avenir, quel qu'il soit

Voir nos clients
Woman smiling with glasses looking out window

L’équipe de services professionnels talentueuse et expérimentée de Netskope propose une approche prescriptive pour une mise en œuvre réussie.

Plus d'informations
Netskope Professional Services

Sécurisez votre parcours de transformation numérique et tirez le meilleur parti de vos applications cloud, Web et privées grâce à la formation Netskope.

Plus d'informations
Group of young professionals working
  • Ressources

    Découvrez comment Netskope peut vous aider à sécuriser votre migration vers le Cloud.

  • Blog

    Découvrez comment Netskope permet de transformer la sécurité et les réseaux à l'aide du Security Service Edge (SSE).

  • Événements et ateliers

    Restez à l'affût des dernières tendances en matière de sécurité et créez des liens avec vos pairs.

  • Définition de la sécurité

    Tout ce que vous devez savoir dans notre encyclopédie de la cybersécurité.

Podcast Security Visionaries

Episode 18: Fostering Relationships for Security Awareness

Écouter le podcast
Black man sitting in conference meeting

Découvrez comment Netskope permet de passer au Zero Trust et au modèle SASE grâce aux fonctions du Security Service Edge (SSE).

Lire le blog
Sunrise and cloudy sky


Netskope is positioned to help you begin your journey and discover where Security, Networking, and Zero Trust fit in the SASE world.

Plus d'informations

Qu'est-ce que le Security Service Edge ?

Découvrez le côté sécurité de SASE, l'avenir du réseau et de la protection dans le cloud.

Plus d'informations
Four-way roundabout
  • Entreprise

    Nous vous aidons à conserver une longueur d'avance sur les défis posés par le cloud, les données et les réseaux en matière de sécurité.

  • Pourquoi Netskope

    La transformation du cloud et le travail à distance ont révolutionné le fonctionnement de la sécurité.

  • Équipe de direction

    Nos dirigeants sont déterminés à faciliter la réussite de nos clients.

  • Partenaires

    Nous collaborons avec des leaders de la sécurité pour vous aider à sécuriser votre transition vers le cloud.

Netskope permet l'avenir du travail.

En savoir plus
Curvy road through wooded area

Netskope redéfinit la sécurité du cloud, des données et des réseaux afin d'aider les entreprises à appliquer les principes Zero Trust pour protéger leurs données.

Plus d'informations
Switchback road atop a cliffside

Penseurs, concepteurs, rêveurs, innovateurs. Ensemble, nous fournissons le nec plus ultra des solutions de sécurité cloud afin d'aider nos clients à protéger leurs données et leurs collaborateurs.

Rencontrez notre équipe
Group of hikers scaling a snowy mountain

La stratégie de commercialisation de Netskope privilégie ses partenaires, ce qui leur permet de maximiser leur croissance et leur rentabilité, tout en transformant la sécurité des entreprises.

Plus d'informations
Group of diverse young professionals smiling

A Quantum Arms Race in Cybersecurity

Dec 13 2022

In 2001, NIST (the US National Institute of Standards and Technology) announced Advanced Encryption Standard (AES), a new encryption standard, designed to help organisations enhance protections against brute force attacks. The previous Data Encryption Standard (DES) had become vulnerable, with processing power growing, and the Electronic Frontier Foundation (EFF) had proved that DES encryption could be broken in less than 24 hours, therefore a new encryption standard was required.

That was more than two decades ago, and AES has served us well, but are its days numbered?

I am not the only one asking this question. NIST has yet again called for new encryption standards, this time recognising that quantum computing will eventually become a threat to our current encryption standards. The consultation is already well underway, with the four finalist contenders for Quantum-Resistant Cryptographic Algorithms announced. 

The reason for all this activity is simple—quantum computers can use their advanced mechanical processing advantage to crack encryption that previously took an unworkably long time to break. And while today’s quantum computers are currently found in laboratory and research settings, there is talk that in 2023 we could see the first quantum computers go on general sale. Once these machines get into the wrong hands, our aging encryption methods could quickly become compromised in a focused quantum decryption effort. 

In reality of course, these resources don’t even have to be available on the open market to be a threat. State-sponsored actors are behind the majority of large and successful cyber attacks today. Given the funding many states put towards cyber warfare and cyber espionage, it is not far-fetched to imagine that they will be early adopters or even look to gain access to the quantum computers that reside in universities and other research institutions today. 

And perhaps quantum only needs to be a possibility to spur a data breach. The phrase “hack now, crack later” describes cyber criminals anticipating future decryption capabilities and stealing data that they cannot currently decrypt and access today. Think of it as a stolen nest egg.

In this blog headline I referenced a quantum arms race. Many states have publicly declared their interest in getting to quantum first, or at least in the vanguard. It is a widely acknowledged national security advantage as much as it is an economically driven aspiration. You don’t need to have watched all of the James Bond movies to worry about what might happen if the bad guys get to quantum before the good guys.

Given this context, it is inevitable that the security professionals I have been speaking with are starting to plan; working out the extent of change needed and beginning to anticipate impending disruption. As an outline, consider the following as to what organisations should start to think about and what may be helpful in a long-term encryption strategy. Think of it as a Solace for Quantum if you will…

Organisations should start to plan a process for an encryption standards switchover. This plan will need to factor in all platforms and products that are already in the security stack and network architecture, so teams should open channels of communication with all technology vendors to start discussions around how they are planning to tackle the encryption migration. 

Bear in mind that applying quantum-resistant encryption—at least in its early years—is simply not going to be a workable approach for the bulk of your data. It could create huge performance issues if you are expecting to encrypt data that is regularly accessed and used (quantum computers are powerful, but it will take a while before the processing power is ubiquitous enough to be found handling the inline, dynamic decryption that we are all used to for transactions). More appropriately, now is a good time to consider zero trust principles and modern security architectures which will provide a solid foundation upon which to build encryption changes in time.

This is also yet another opportunity for me to advise undertaking a data audit—regular readers will know I see this as an essential starting point for any effective data protection strategy. Identify what data your organisation holds, where it resides, and how access is granted.  

In the immediate period, I would recommend that you pay special attention to data which has long term value. For example, if someone stole it today, would it be worth sitting on it for 1, 3, 5, or 10 years or more until a simple decryption option is available to them? If the answer is yes, this is the data that you should prioritise as the new standards become available.  Realistically, most of the data you need to protect today might never need to be encrypted using quantum-resistant methods—it will lose most of its value before quantum attacks are a reality, so your plans for re-encrypting run-rate data can be phased in for new data rather than retro-fitted against old.

I often get asked what a realistic timeline looks like for quantum security considerations. While we can only wait to see how quickly these machines come to the market, government deadlines provide a useful indication of the expectations of those in the know. As an example, the US Government has specified that all US Government agencies and their suppliers must use quantum-resistant encryption by 2035 (with roll-out set to start in 2025). That may seem a long way off, but it isn’t, and it’s even less time if,for instance, you are an organisation that is part of the supply chain to government agencies across the world.

Also, don’t simply look forward in this planning, you need to look backwards too. While I have said much of your current data may lose value very quickly, your organisation probably has a store of archived data. Don’t forget to evaluate the data protection you have surrounding this long-term storage of data. Identify how long you have held data and audit how it is protected. You may even discover you are still using DES or 3DES!

Finally, think about how you will explain these initiatives, standards changes and your organisation’s change requirements to all necessary stakeholders. All of this planning and activity is likely to impact both resource bandwidth and budget over the coming years. It will also be important to keep in touch with regulatory bodies—both on a national and industry level. Close collaboration will ensure you keep ahead of impending compliance issues and these bodies will also likely start to issue helpful guidelines over the coming months and years.

We can probably all agree that this kind of innovation is one of the most appealing characteristics of the industry for many of us. But any change requires thought and effort to stay ahead. I am looking forward to collaborating with my peers and supporting our customers as we move into this new challenge. Because, as Commander Bond might state, you always want to ensure sensitive data remains For Your Eyes Only.

author image
Neil Thacker
Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union General Data Protection Regulation (EU GDPR).