Due volte leader nel Quadrante Magico di Gartner® per le piattaforme SASE. Scarica il Report

chiudere
chiudere
La tua rete di domani
La tua rete di domani
Pianifica il tuo percorso verso una rete più veloce, sicura e resiliente, progettata per le applicazioni e gli utenti che supporti.
Experience Netskope
Prova direttamente la piattaforma Netskope
Ecco la tua occasione per sperimentare in prima persona la piattaforma single-cloud di Netskope One. Iscriviti a laboratori pratici e a ritmo autonomo, unisciti a noi per dimostrazioni mensili di prodotti dal vivo, fai un test drive gratuito di Netskope Private Access o partecipa a workshop dal vivo guidati da istruttori.
Un leader in SSE. Ora è un leader nel settore SASE a singolo fornitore.
Netskope è riconosciuto come Leader Più Lontano in Visione sia per le piattaforme SSE che SASE
2 volte leader nel Quadrante Magico di Gartner® per piattaforme SASE
Una piattaforma unificata costruita per il tuo percorso
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Scopri come la tua organizzazione può bilanciare il potenziale innovativo dell'AI generativa con pratiche solide di sicurezza dei dati.
eBook sulla Modern Data Loss Prevention (DLP) for Dummies
Modern Data Loss Prevention (DLP) for Dummies
Ricevi consigli e trucchi per passare a un DLP fornito dal cloud.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Smettila di inseguire la tua architettura di rete
Comprendere dove risiede il rischio
Advanced Analytics trasforma il modo in cui i team di operazioni di sicurezza applicano insight basati sui dati per implementare policy migliori. Con l'Advanced Analytics, puoi identificare tendenze, concentrarti sulle aree di interesse e utilizzare i dati per agire.
Supporto tecnico Netskope
Supporto tecnico Netskope
I nostri ingegneri di supporto qualificati sono dislocati in tutto il mondo e possiedono competenze diversificate in sicurezza cloud, networking, virtualizzazione, content delivery e sviluppo software, garantendo un'assistenza tecnica tempestiva e di qualità.
Video Netskope
Formazione Netskope
La formazione Netskope ti aiuterà a diventare un esperto di sicurezza cloud. Siamo qui per aiutarti a proteggere il tuo percorso di trasformazione digitale e a sfruttare al meglio le tue applicazioni cloud, web e private.

The Most Critical CASB Use Cases in the Market Today: Block or remediate malware in sanctioned and unsanctioned cloud services, even when users are accessing from mobile or desktop apps or sync clients

Jan 05 2017
Tags
CASB
Cloud Best Practices
Cloud Security
Tools and Tips

As cloud services become more popular and broadly used, they are becoming a big target for hackers. This is especially disconcerting, since most organizations don’t know fully what services are in use, much less which ones are the target of malware developers. Moreover, many organizations do not inspect SSL traffic for malware because it impacts network performance. This makes it easy for malware to hide in plain sight in cloud services, even popular ones like OneDrive, Box, Google Drive, and Dropbox, which organizations have either sanctioned or at least for which they have made an exception in their application firewall or web gateway. Netskope finds that one out of every ten enterprises has found malware in its sanctioned services, and on average, has 26 pieces of malware in those services. As IT and security professionals invest in a cloud access security broker (CASB) to enable them to monitor and control cloud services, they expect that investment perform more security functions, and threat protection is at the top of the list.

Blocking, detecting, and remediating malware in cloud services is critical, but it needs to be comprehensive across not just sanctioned cloud services – which represent less than five percent of cloud usage in an organization – but also unsanctioned ones. More importantly, threat protection in the cloud needs to work whether users are accessing services from on-premises or remotely and whether they’re on a browser, mobile app, or sync client. Netskope customers have deployed our ALL-MODE architecture (with more than three-quarters of them going beyond a single mode) to achieve their most critical use cases. We have noted 15 of these use cases in our recent e-book, The 15 Critical CASB Use Cases, and we’re highlighting them and more (and we want to hear from you too!) in this blog.  

Here’s use case #4: Block or remediate malware in sanctioned and unsanctioned cloud services, even when users are accessing from mobile or desktop apps or sync clients.

How can a CASB enable this use case? A CASB sits in between the user and the cloud service provider and monitors, enforces policy, and guards against threats. This level of protection requires a multi-mode deployment architecture that includes at least a forward proxy and API-based introspection, and may be helped in part with a reverse proxy deployment. To cover remote and mobile access, the organizations must use a thin agent or mobile profile to steer cloud traffic to the CASB for SSL traffic inspection. Here are four critical functional requirements that are needed to achieve this use case:

  • Inspect, detect, block, and remediate malware in sanctioned cloud services
  • Inspect, detect, block, and remediate malware en route to/from unsanctioned cloud services
  • Have visibility over cloud traffic whether it’s coming from a web browser, mobile app, or sync client
  • Decrypt SSL and decode the unpublished API to understand the transaction (for forward proxy)

How are you protecting against threats and malware in your cloud services? We want to hear from you. Learn more about this and 14 additional most impactful use cases by downloading The 15 Critical CASB Use Cases.

author image
Gautam Kanaparthi
Browse recent articles by Gautam Kanaparthi, one of the contributors at Netskope. Discover the latest trends and updates within the cloud and network space.
Browse recent articles by Gautam Kanaparthi, one of the contributors at Netskope. Discover the latest trends and updates within the cloud and network space.
Connettiti con Netskope

Iscriviti al blog di Netskope

Iscriviti per ricevere ogni mese una panoramica degli ultimi contenuti di Netskope direttamente nella tua casella di posta.