Netskope est nommé leader dans le Magic Quadrant™ du Gartner 2022 dédié au Security Service Edge Recevoir le rapport

  • Security Service Edge Products

    Protect against advanced and cloud-enabled threats and safeguard data across all vectors.

  • Borderless SD-WAN

    Confidently provide secure, high-performance access to every remote user, device, site, and cloud.

  • Plateforme

    Une visibilité inégalée et une protection des données et des menaces en temps réel sur le plus grand cloud privé de sécurité au monde.

Netskope reconnu comme un des leaders dans le rapport du Magic Quadrant™ 2022 du Gartner dédié au SSE

Recevoir le rapport Présentation des produits
Netskope gartner mq 2022 leader sse

Réponse rapide de Gartner® : Quel est l'impact de l'acquisition d'Infiot par Netskope sur les projets SD-WAN, SASE et SSE ?

Recevoir le rapport
Quick Answer: How Does Netskope’s Acquisition of Infiot Impact SD-WAN, SASE and SSE Projects?

Netskope offre une solution moderne de sécurité du cloud, dotée de fonctions unifiées en matière de protection des données et de détection des menaces, et d'un accès privé sécurisé.

Découvrir notre plateforme
Vue aérienne d'une métropole

Optez pour les meilleurs services de sécurité cloud du marché, avec un temps de latence minimum et une fiabilité élevée.

Plus d'informations
Lighted highway through mountainside switchbacks

Neutralisez les menaces qui échappent souvent à d'autres solutions de sécurité à l'aide d'un framework SSE unifié.

Plus d'informations
Lighting storm over metropolitan area

Solutions Zero Trust pour les déploiements du SSE et du SASE

Plus d'informations
Boat driving through open sea

Netskope permet à toutes les entreprises d'adopter des services et des applications cloud ainsi que des infrastructures cloud publiques rapidement et en toute sécurité.

Plus d'informations
Wind turbines along cliffside
  • Nos clients

    Netskope sert plus de 2 000 clients dans le monde, dont plus de 25 des entreprises du classement Fortune 100

  • Solutions pour les clients

    Nous sommes là pour vous et avec vous à chaque étape, pour assurer votre succès avec Netskope.

  • Formation et certification

    Avec Netskope, devenez un expert de la sécurité du cloud.

Nous parons nos clients à l'avenir, quel qu'il soit

Voir nos clients
Woman smiling with glasses looking out window

L’équipe de services professionnels talentueuse et expérimentée de Netskope propose une approche prescriptive pour une mise en œuvre réussie.

Plus d'informations
Netskope Professional Services

Sécurisez votre parcours de transformation numérique et tirez le meilleur parti de vos applications cloud, Web et privées grâce à la formation Netskope.

Plus d'informations
Group of young professionals working
  • Ressources

    Découvrez comment Netskope peut vous aider à sécuriser votre migration vers le Cloud.

  • Blog

    Découvrez comment Netskope permet de transformer la sécurité et les réseaux à l'aide du Security Service Edge (SSE).

  • Événements et ateliers

    Restez à l'affût des dernières tendances en matière de sécurité et créez des liens avec vos pairs.

  • Security Defined

    Tout ce que vous devez savoir dans notre encyclopédie de la cybersécurité.

Podcast Security Visionaries

Episode 15: Building Permanent Security Awareness

Écouter le podcast
Black man sitting in conference meeting

Découvrez comment Netskope permet de passer au Zero Trust et au modèle SASE grâce aux fonctions du Security Service Edge (SSE).

Lire le blog
Sunrise and cloudy sky

SASE Week

Netskope is positioned to help you begin your journey and discover where Security, Networking, and Zero Trust fit in the SASE world.

Plus d'informations
SASE Week

Qu'est-ce que le Security Service Edge ?

Découvrez le côté sécurité de SASE, l'avenir du réseau et de la protection dans le cloud.

Plus d'informations
Four-way roundabout
  • Entreprise

    Nous vous aidons à conserver une longueur d'avance sur les défis posés par le cloud, les données et les réseaux en matière de sécurité.

  • Pourquoi Netskope

    La transformation du cloud et le travail à distance ont révolutionné le fonctionnement de la sécurité.

  • Équipe de direction

    Nos dirigeants sont déterminés à faciliter la réussite de nos clients.

  • Partenaires

    Nous collaborons avec des leaders de la sécurité pour vous aider à sécuriser votre transition vers le cloud.

Netskope permet l'avenir du travail.

En savoir plus
Curvy road through wooded area

Netskope redéfinit la sécurité du cloud, des données et des réseaux afin d'aider les entreprises à appliquer les principes Zero Trust pour protéger leurs données.

Plus d'informations
Switchback road atop a cliffside

Penseurs, concepteurs, rêveurs, innovateurs. Ensemble, nous fournissons le nec plus ultra des solutions de sécurité cloud afin d'aider nos clients à protéger leurs données et leurs collaborateurs.

Rencontrez notre équipe
Group of hikers scaling a snowy mountain

La stratégie de commercialisation de Netskope privilégie ses partenaires, ce qui leur permet de maximiser leur croissance et leur rentabilité, tout en transformant la sécurité des entreprises.

Plus d'informations
Group of diverse young professionals smiling

Gestion des risques de sécurité des appareils dans l’entreprise hybride avec Netskope IoT Security

Sep 29 2022

Internet-connected devices (also known as “the internet of things”) are a key business enabler for modern enterprises focused on transforming their businesses and gaining competitive advantage through automation and intelligent decision-making. According to IDC, there will be over 55.7 billion connected IoT devices (or “things”) by 2025, generating almost 80B zettabytes (ZB) of data.

While this underlines the enormous opportunity presented by IoT, the effective security for connected devices hasn’t kept pace with their increasing adoption. While more than 1.5 billion IoT breaches occurred in the first half of 2021, a remarkable 136% increase from the previous six months, the breaches are expected to increase in the coming years with the growth in total number of deployed IoT devices.

During the pandemic, many IoT devices were left behind in corporate environments when employees transitioned to remote work. Management oversight and lack of security updates have made these devices highly susceptible to targeted cyberattacks. With hybrid work now normal, employees are expected to bring a diverse set of corporate and personal devices for use in their jobs. The Netskope IoT Security engineering team collected and analyzed the number of connected devices at a representative customer site within a fixed time period in 2021 (“Before”) and 2022 (“Now”). As evident from the graphs below, there has been a huge surge in the number of unmanaged devices within the representative customer site in 2022, as compared to 2021. These devices will further interact with the IoT devices in the corporate networks, creating a significantly larger attack surface to manage and control.

Threat actors keep finding new ways to infiltrate IoT devices every day, and the trend will continue to accelerate as IoT solidifies its presence in mainstream business use.

The way forward

To better secure hybrid enterprises, it is critical to account for every IoT device connected to the corporate network, understand their behavior and dynamic risk posture, and ensure they have the right permissions for accessing internal resources or carrying out their specific business functions. In this regard, here are some of our recommendations for mitigating IoT-related risks:

Establish a baseline

Establish a baseline of network and IoT devices before employees return to offices. Identify the normal behavioral pattern of connecting devices and audit the devices that exhibit anomalous behavior, such as devices connecting for extended periods or beyond normal working hours.

Discover all the connected devices

Account for both managed and unmanaged devices in the corporate environments. Automated discovery of every device connecting to the corporate environment has become increasingly important in the current hybrid work landscape where nearly half of the devices on enterprise networks are unmanaged and IoT and companies are adopting flexible policies to allow internal data access from non-corporate managed devices to ensure business continuity.

Understand the context

Generate rich and dynamic context around every connected IoT device by collecting device information across multiple dimensions—physical, logical, operational, and locational touch points. With the right solution, this contextual information can be combined with machine learning algorithms to generate distinctive models and signatures for each device, allowing for accurate policy control and minimizing the organization’s exposure to potential device-level risks.

Perform continuous risk assessment

The risk posture of a connected IoT device is a factor of multiple attributes, including device type, usage, behavior, owner, location, time of the day, OS updates, and many more. Continuously monitor the connected devices for anomalies and unauthorized access, and enforce security policies that take into account the dynamic risk scores of devices based on their real-time behavior.

Microsegment the networks

Group similar devices within secure zones or software-defined perimeters for tighter visibility and governance over each activity in the IoT environment. Microsegmentation also completely isolates risky devices from the broader IT infrastructure, providing a stronger regulatory compliance posture and preventing lateral movement of threats to reduce the overall attack surface.

Enforce policies at scale

Utilize the rich contextual information and micro-segmentation capabilities to tailor security and create dynamic access control policies at scale based on multiple contextual factors such as device type, interface, and functionality; logical properties such as ownership and control; threat and risk assessment; and dynamic properties such as location and time. For example, applying network access control rules for grouping all smart cameras and blocking their access from unmanaged devices.

How Netskope IoT Security addresses the IoT security gaps in the hybrid enterprise

Netskope IoT Security is an agentless, innovative, and smart device security solution that provides visibility into all the internet-connected “Things” in the enterprise network and secures them with a context-driven, zero trust approach. The solution’s HyperContext® platform uncovers managed and unmanaged devices on both the radio and network spectrum and leverages AI/ML algorithms to generate deep, device-level contextual intelligence for solving the hybrid enterprise challenges through the following use cases:

  • Device classification and visibility: Scanning the hybrid enterprise landscape to discover and classify a range of managed, unmanaged, and IoT devices, including smartphones, audio conferencing devices, smart cameras, thermostats, etc., with rich contextual information for deep insights into device behavior and activity.
  • Cybersecurity asset management: Comprehensive asset management with built-in asset inventory engine. The solution correlates multiple device interfaces to a single entity, providing an accurate account of devices and driving mandatory service compliance in adherence to corporate policies.
  • Device risk: Continuous monitoring of devices to detect anomalies and generate unique device risk scores based on their characteristics and activities, exchanging device attributes with SIEM and SOAR tools for automated remedial actions and minimizing alert fatigue.
  • Access control and segmentation: Dynamic asset grouping and micro segmentation based on context and real-time device behavior, and orchestrating actions using existing network systems such as network access control (NAC), firewalls, and access points.

Register for a live product demo

Join us for a live session on October 5, 2022, where our team of experts will give a detailed tour of the product and demonstrate how Netskope IoT Security addresses the critical IoT device security risks in the hybrid enterprise.

author image
Neeraj Nayak
Neeraj Nayak is a Senior Product Marketing Manager at Netskope. With over a decade of experience in the cybersecurity industry, Neeraj has deep understanding of networking and security solutions including SASE, SSE, CASB, ZTNA, DLP, SD-WAN, and IoT.