Netskope est à nouveau reconnu comme leader dans le Magic Quadrant de Gartner®™ pour les plates-formes SASE. Obtenir le rapport

fermer
fermer
Le réseau de demain
Le réseau de demain
Planifiez votre chemin vers un réseau plus rapide, plus sûr et plus résilient, conçu pour les applications et les utilisateurs que vous prenez en charge.
          Essayez Netskope
          Mettez la main à la pâte avec la plateforme Netskope
          C'est l'occasion de découvrir la plateforme Netskope One single-cloud de première main. Inscrivez-vous à des laboratoires pratiques à votre rythme, rejoignez-nous pour des démonstrations mensuelles de produits en direct, faites un essai gratuit de Netskope Private Access ou participez à des ateliers dirigés par un instructeur.
            Un leader sur SSE. Désormais leader en matière de SASE à fournisseur unique.
            Netskope est reconnu comme le leader le plus avancé dans sa vision pour les plateformes SSE et SASE.
            2X est un leader dans le Magic Quadrant de Gartner® pour les plateformes SASE
            Une plateforme unifiée conçue pour votre parcours
              Sécuriser l’IA générative pour les nuls
              Sécuriser l’IA générative pour les nuls
              Découvrez comment votre organisation peut concilier le potentiel d'innovation de l'IA générative avec des pratiques robustes en matière de sécurité des données.
                Prévention des pertes de données (DLP) pour les Nuls eBook
                La prévention moderne des pertes de données (DLP) pour les Nuls
                Obtenez des conseils et des astuces pour passer à un système de prévention des pertes de données (DLP) dans le nuage.
                  Réseau SD-WAN moderne avec SASE pour les nuls
                  SD-WAN moderne pour les nuls en SASE
                  Cessez de rattraper votre retard en matière d'architecture de réseau
                    Identification des risques
                    Advanced Analytics transforme la façon dont les équipes chargées des opérations de sécurité utilisent les données pour mettre en œuvre de meilleures politiques. Avec Advanced Analytics, vous pouvez identifier les tendances, cibler les domaines préoccupants et utiliser les données pour prendre des mesures.
                        Support technique de Netskope
                        Support technique de Netskope
                        Nos ingénieurs d'assistance qualifiés sont répartis dans le monde entier et possèdent des expériences diverses dans les domaines de la sécurité du cloud, des réseaux, de la virtualisation, de la diffusion de contenu et du développement de logiciels, afin de garantir une assistance technique rapide et de qualité
                          Vidéo Netskope
                          Formation Netskope
                          Grâce à Netskope, devenez un expert de la sécurité du cloud. Nous sommes là pour vous aider à achever votre transformation digitale en toute sécurité, pour que vous puissiez profiter pleinement de vos applications cloud, Web et privées.

                            Netskope and Okta: Coming Together for Continuous Adaptive Trust

                            Nov 03 2022

                            Challenges from the modern workforce

                            The problem of securing the modern workforce goes beyond occasional spats between IT and security. The real problems we see are  user credentials under constant attack, alongside attempts to harvest and exploit enterprise data. Plus the cloud resources that workforces need are tough to secure, especially when deployed outside of IT-led processes. In light of these issues, corporations need a way to securely provide always-on cloud access for users while safeguarding enterprise data anywhere it goes.

                            There are underlying challenges that no single vendor can solve to help address these obstacles for securely enabling the modern workforce. Regardless of its efficacy, no one tool can solve all of these problems, and as a result we need modern tools to be integrated. For example, identity-based controls require federation, while legacy security solutions are stuck on the binary of either allowing or blocking sessions, applications, or transactions. 

                            Let’s expand on these examples and explore what the dependencies of identity based and security-based controls mean for IT teams.

                            1. Identity-based controls

                            According to the July 2022 Netskope Cloud and Threat Report, organizations use an average of 2,100 apps, while only approximately 89 applications are managed by IT according to Okta’s Business at Work 2022 Annual Report. The modern workplace typically enables users to procure and access applications without requesting permission from security or IT. IT can only federate applications that they have formally rolled out, leading to this significant disparity. There are third-party systems or applications that can drive users back to IT, but IT still needs to federate to fully control the application. 

                            1. Security-based controls

                            The traditional approach was to block unknown or untrusted applications or websites because security teams lacked the ability to see how users could engage with these resources. It did not matter that identity providers, like Okta, provided an authenticated user to tie to the resource being reached because either the connection was implicitly trusted (a known user going to the “safe” OneDrive site, but really using their non-corporate instance), or explicitly denied (known user going to a relatively unknown cloud site to do perfectly safe business and blocking may just be “safer”). Without context, security-controls are going to over-correct or under-correct. 

                            With context and deep visibility into not only the user and the destination, but also the minutiae around how they are connecting and what they are doing with the data and service, we can safely navigate and enable the modern worker. Here’s how we can do this:

                            Continuous adaptive zero trust

                            Netskope and Okta are proud to reaffirm our commitment to an integration strategy that helps IT and security provide nuanced, continuous zero trust controls that keep the workforce secure, performant, and productive. How do we do this?

                            1. Fine-grained access control lets IT provision users and groups within Netskope for policies covering ALL Internet activities
                            2. Policy-driven cloud access backed by strong authentication powers visibility into user access and behavior from login to logout for all applications and web browsing 
                            3. Globally consistent, continuously enforced, real-time identity-based policy including automated ongoing identity validation based on risk
                            4. Enterprises can enjoy real-time end-to-end protections from a wide array of internal and external threats thanks to this industry-leading identity and secure access services edge (SASE) partnership

                            Netskope helps companies get more out of their identity spend by binding the use of all applications to Okta managed identity in Netskope reporting and enforcement. So even if your users decide to start engaging with an application that no one in the IT/identity shop knows about, Netskope ties their non-federated usage to their Okta identity. Now IT can bring those much-needed applications (and there are MANY) back into the Okta Life Cycle Management program.

                            Another example of how this works is in our joint approach to delivering Access, Authentication, and Authorization (AAA) in a hybrid IT environment. Netskope Private Access for Zero Trust Network Access (ZTNA) securely enables users—that Okta Advanced Server Access has authenticated at session establishment and that Netskope continuously revalidates using Okta step up tech—to access the premise or cloud-based solution. Okta then manages the authorization of the user to work with the application. Netskope brings secure access, Okta delivers industry leading authentication and authorization, as depicted in the diagram below.

                            Together, we’re unstoppable and the age of free love between IT and Security is possible. Learn more about how Netskope can help you get more out of your Okta solution and safely enable your modern workplace.

                            Netskope is sponsoring and exhibiting at Okta’s annual customer and user conference, Oktane 22, on Nov 8-10 in San Francisco. We’re showcasing the Netskope SSE Intelligent platform and our key Okta integrations that help organizations eliminate the security risks associated with Shadow IT, and provide more visibility and control over all applications used by employees, sanctioned and unsanctioned and more. Stop by the Netskope booth #E7 to speak with our team and to see our latest demos.

                            author image
                            David Willis
                            David is an experienced business, security, and technology leader with over 20 years across telecommunications, financial services, and software industry verticals.
                            David is an experienced business, security, and technology leader with over 20 years across telecommunications, financial services, and software industry verticals.
                            Connectez-vous avec Netskope

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.