Netskope est nommé leader dans le Magic Quadrant™ du Gartner 2022 dédié au Security Service Edge Recevoir le rapport

  • Produits

    Les produits Netskope sont conçus sur Netskope Security Cloud.

  • Plateforme

    Une visibilité inégalée et une protection des données et des menaces en temps réel sur le plus grand cloud privé de sécurité au monde.

Netskope reconnu comme un des leaders dans le rapport du Magic Quadrant™ 2022 du Gartner dédié au SSE

Recevoir le rapport Présentation des produits
Netskope gartner mq 2022 leader sse

Netskope offre une solution moderne de sécurité du cloud, dotée de fonctions unifiées en matière de protection des données et de détection des menaces, et d'un accès privé sécurisé.

Découvrir notre plateforme
Vue aérienne d'une métropole

Optez pour les meilleurs services de sécurité cloud du marché, avec un temps de latence minimum et une fiabilité élevée.

Plus d'informations
Lighted highway through mountainside switchbacks

Neutralisez les menaces qui échappent souvent à d'autres solutions de sécurité à l'aide d'un framework SSE unifié.

Plus d'informations
Lighting storm over metropolitan area

Solutions Zero Trust pour les déploiements du SSE et du SASE

Plus d'informations
Boat driving through open sea

Netskope permet à toutes les entreprises d'adopter des services et des applications cloud ainsi que des infrastructures cloud publiques rapidement et en toute sécurité.

Plus d'informations
Wind turbines along cliffside
  • Suivi de nos clients

    Sécurisez votre transformation digitale et profitez pleinement de vos applications privées, cloud et Web.

  • Support client

    Un accompagnement proactif et la volonté d'optimiser votre environnement Netskope et de booster votre réussite.

  • Formation et certification

    Avec Netskope, devenez un expert de la sécurité du cloud.

Choisissez Netskope pour vous aider à faire face aux menaces toujours grandissantes, mais aussi aux risques émergents, aux évolutions technologiques, aux changements organisationnels et réseau, ainsi qu'aux nouvelles exigences réglementaires.

Plus d'informations
Woman smiling with glasses looking out window

Notre équipe mondiale d'ingénieurs qualifiés met à profit son expérience plurielle dans les domaines de la sécurité du cloud, la mise en réseau, la virtualisation, la diffusion de contenu et le développement logiciel pour fournir une réponse rapide et efficace à vos questions techniques.

Plus d'informations
Bearded man wearing headset working on computer

Sécurisez votre parcours de transformation numérique et tirez le meilleur parti de vos applications cloud, Web et privées grâce à la formation Netskope.

Plus d'informations
Group of young professionals working
  • Ressources

    Découvrez comment Netskope peut vous aider à sécuriser votre migration vers le Cloud.

  • Blog

    Découvrez comment Netskope permet de transformer la sécurité et les réseaux à l'aide du Security Service Edge (SSE).

  • Événements et ateliers

    Restez à l'affût des dernières tendances en matière de sécurité et créez des liens avec vos pairs.

  • Security Defined

    Tout ce que vous devez savoir dans notre encyclopédie de la cybersécurité.

Podcast Security Visionaries

Épisode bonus : L'importance du Security Service Edge (SSE) – en anglais

Écouter le podcast
Black man sitting in conference meeting

Découvrez comment Netskope permet de passer au Zero Trust et au modèle SASE grâce aux fonctions du Security Service Edge (SSE).

Lire le blog
Sunrise and cloudy sky

SASE Week

Netskope is positioned to help you begin your journey and discover where Security, Networking, and Zero Trust fit in the SASE world.

Plus d'informations
SASE Week

Qu'est-ce que le Security Service Edge ?

Découvrez le côté sécurité de SASE, l'avenir du réseau et de la protection dans le cloud.

Plus d'informations
Four-way roundabout
  • Entreprise

    Nous vous aidons à conserver une longueur d'avance sur les défis posés par le cloud, les données et les réseaux en matière de sécurité.

  • Pourquoi Netskope

    La transformation du cloud et le travail à distance ont révolutionné le fonctionnement de la sécurité.

  • Équipe de direction

    Nos dirigeants sont déterminés à faciliter la réussite de nos clients.

  • Partenaires

    Nous collaborons avec des leaders de la sécurité pour vous aider à sécuriser votre transition vers le cloud.

Netskope permet l'avenir du travail.

En savoir plus
Curvy road through wooded area

Netskope redéfinit la sécurité du cloud, des données et des réseaux afin d'aider les entreprises à appliquer les principes Zero Trust pour protéger leurs données.

Plus d'informations
Switchback road atop a cliffside

Penseurs, concepteurs, rêveurs, innovateurs. Ensemble, nous fournissons le nec plus ultra des solutions de sécurité cloud afin d'aider nos clients à protéger leurs données et leurs collaborateurs.

Rencontrez notre équipe
Group of hikers scaling a snowy mountain

La stratégie de commercialisation de Netskope privilégie ses partenaires, ce qui leur permet de maximiser leur croissance et leur rentabilité, tout en transformant la sécurité des entreprises.

Plus d'informations
Group of diverse young professionals smiling
Blog DNA, Full Skope Stop Using Static Security to Protect Dynamic Clouds
Mar 03 2022

Stop Using Static Security to Protect Dynamic Clouds

Software-as-a-service (SaaS) has taken over the world because it’s easy. With just a few clicks, business units can find an application that’s suitable for a particular business process. They can subscribe to it and immediately start using it — and the IT department might never find out.

Cloud access security brokers (CASB) first emerged to help security teams track and manage their emerging shadow IT problem to gain some visibility and control. But today, according to research from Digital Ocean, 86% of companies increased their reliance on cloud services in 2021. Research from Netskope shows companies now use an average of 805 distinct cloud applications per month, 97% of which are ungoverned. The few that are governed are likely not very well controlled. We may be able to take some solace from the fact that the most mission-critical data is usually concentrated in a few of the most strategic SaaS apps (e.g., Office 365, Salesforce, GitHub, Google Workspace, etc.), limiting the need for guesswork into thousands of other SaaS apps that aren’t as well known. 

That said, a lot of mission-critical data also winds up in custom applications that people write and deploy into an infrastructure-as-service (IaaS) cloud, such as Microsoft Azure, Amazon Web Services (AWS), or Google Cloud Platform (GCP). These environments are sufficiently different from the on-premises world. The kinds of tools people use to check the health of applications and infrastructures that were built on-premises don’t accommodate the cloud very well. On-premises security and monitoring tools were all built under the assumption of static existence. The infrastructure was set, and the applications and the data were static. The cloud inverts this thinking and is dynamic. The dynamism in the public cloud causes a lot of traditional security tools to break. 

Multi-Cloud Challenges In-House Expertise

Almost every organization on the planet is now multi-cloud. Many will use AWS for some projects and use GCP for others and Azure for still others. In the case of mergers and acquisitions, the choice of cloud platform may even be forced upon you out of circumstance. Or sometimes, choosing a certain platform over another might be a case of suitability for a particular application or developer proficiency.

One of the challenges here is that it’s hard enough to be an expert in even one of these platforms. Each one may have hundreds of different services and the services talk among themselves in varying ways. For example, the access control model for AWS is unlike any access control model you’ve ever seen for any other service before, so being an AWS expert is difficult enough. How can you possibly also be an expert in Azure and GCP as well? It’s a struggle. The human brain just can’t easily grapple with so much at once. Nevertheless, arguing against multi-cloud isn’t a hill worth dying on. Every business is multi-cloud now. 

Orient Your Teams Toward Cloud-Native Security

Most business-ready cloud services, whether IaaS, PaaS or SaaS, offer a useful set of built-in security controls sufficient to guard against common threats. When ascertaining the steps necessary to use a cloud service securely, start with these. It’s likely, though, that you’ll reach a point where the built-in controls insufficiently protect against novel threats. You might conclude that the built-ins lack the flexibility to express detailed policies. It’s also likely that you’ll notice you’re repeating work, such as configuring some DLP rules in Microsoft 365 and substantially similar rules in Amazon Macie. Who wants the boring job of manually verifying consistency for dozens of controls in hundreds of applications? The escape from this conundrum is to layer in cloud-native security controls from a third-party cloud security provider. I’ll offer a few examples.

Some built-in controls are unavoidable: You’ll almost certainly need to create person and service identities (also known as “security principals”) in the IaaS/PaaS/SaaS built-in identity management system. You’ll also need to provision access controls on resources via a built-in mechanism of expression. A third-party cloud security tool can continuously monitor the rights granted to security principals, along with permissions configured on resources, to ensure rights aren’t too broad and permissions aren’t overly-scoped. When a single tool manages entitlements across your entire cloud estate, the outcome is a degree of consistency and predictability that is otherwise essentially unobtainable.

Another domain in which third-party cloud-native security tools excel is identifying sensitive information and managing its spread. I previously mentioned the drudgery of configuring and maintaining duplicate DLP rules. Inconsistent and incomplete rules introduce real risk, creating potential targets of attack. But know this: Most SaaS applications lack any form of built-in DLP at all. I would bet that at least a sliver of your company’s sensitive information resides in a smattering of DLP-free SaaS applications. A cloud-native DLP capability — something that every good CASB offers — eliminates duplicate work and ensures consistency of policy actions across all your cloud applications and projects. Unlike the previous example where the third-party tool augments a built-in control, here the third-party tool substitutes for a built-in control or enables such control where no built-in exists.

No single “cloud security” market exists. Instead, hundreds of products in a dozen-ish sometimes-overlapping markets vie for your attention. In almost every instance, startups have identified cloud security gaps and responded with compelling offerings. Over time, the major incumbent security vendors have acquired many such startups. Levels of integration vary wildly: A platform in which capabilities share resources and configuration outperforms a portfolio of random stuff. To learn about new and emerging markets, consult your favorite industry analyst reports. Check in with your peers, who might already have experience with vendors in these markets. Favor vendors who offer integrated platforms and can work with certain parts of your existing infrastructure, like your directory service, your SIEM and your endpoint protection platform. Conduct a proof-of-concept to verify fitness for purpose.

Your data, applications and people haven’t been static for a long time. Neither should your security remain static. The best way to protect the cloud is with the cloud — always has been, always will be.

Article originally published at Forbes Tech Council.

author image
About the author
Steve Riley is a Field CTO at Netskope. Having worked at the intersection of cloud and security for pretty much as long as that’s been an actual topic, Steve offers that perspective to field and executive engagements and also supports long-term technology strategy and works with key industry influencers. Steve has held technology roles for more than three decades, including stints at Gartner Inc., Riverbed Technology, Amazon Web Services, and Microsoft Corp.
Steve Riley is a Field CTO at Netskope. Having worked at the intersection of cloud and security for pretty much as long as that’s been an actual topic, Steve offers that perspective to field and executive engagements and also supports long-term technology strategy and works with key industry influencers. Steve…