Evento di Lancio: Smart AI Security. Controllo Totale dei Dati. Prenota il tuo posto

chiudere
chiudere
La tua rete di domani
La tua rete di domani
Pianifica il tuo percorso verso una rete più veloce, sicura e resiliente, progettata per le applicazioni e gli utenti che supporti.
Experience Netskope
Prova direttamente la piattaforma Netskope
Ecco la tua occasione per sperimentare in prima persona la piattaforma single-cloud di Netskope One. Iscriviti a laboratori pratici e a ritmo autonomo, unisciti a noi per dimostrazioni mensili di prodotti dal vivo, fai un test drive gratuito di Netskope Private Access o partecipa a workshop dal vivo guidati da istruttori.
Un leader in SSE. Ora è un leader nel settore SASE a singolo fornitore.
Netskope è riconosciuto come Leader Più Lontano in Visione sia per le piattaforme SSE che SASE
2 volte leader nel Quadrante Magico di Gartner® per piattaforme SASE
Una piattaforma unificata costruita per il tuo percorso
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Scopri come la tua organizzazione può bilanciare il potenziale innovativo dell'AI generativa con pratiche solide di sicurezza dei dati.
eBook sulla Modern Data Loss Prevention (DLP) for Dummies
Modern Data Loss Prevention (DLP) for Dummies
Ricevi consigli e trucchi per passare a un DLP fornito dal cloud.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Smettila di inseguire la tua architettura di rete
Comprendere dove risiede il rischio
Advanced Analytics trasforma il modo in cui i team di operazioni di sicurezza applicano insight basati sui dati per implementare policy migliori. Con l'Advanced Analytics, puoi identificare tendenze, concentrarti sulle aree di interesse e utilizzare i dati per agire.
Supporto tecnico Netskope
Supporto tecnico Netskope
I nostri ingegneri di supporto qualificati sono dislocati in tutto il mondo e possiedono competenze diversificate in sicurezza cloud, networking, virtualizzazione, content delivery e sviluppo software, garantendo un'assistenza tecnica tempestiva e di qualità.
Video Netskope
Formazione Netskope
La formazione Netskope ti aiuterà a diventare un esperto di sicurezza cloud. Siamo qui per aiutarti a proteggere il tuo percorso di trasformazione digitale e a sfruttare al meglio le tue applicazioni cloud, web e private.

Netskope Cloud Report: A Look at Compromised Credentials

Jan 08 2015
Tags
Box Security
Data Loss Prevention Software
Dropbox Security
Netskope Cloud Report
Security Audit

We released the Netskope Cloud Report for January today. In it, we report the latest numbers for cloud app adoption, with an average of 613 cloud apps per enterprise, as well as a host of other goodies, like top-used apps, activities that constitute a policy violation, and percentage of content-at-rest in sanctioned cloud storage that violates organizations’ data loss prevention profiles like PII and PCI.

Every quarter we drill a little deeper beyond our standard statistics into an area of cloud security, from activities like sharing to mobile cloud usage. This quarter, we highlighted some research that we are conducting around compromised account credentials. We have noticed that a growing number of enterprise cloud users are logging into their cloud apps using login names and passwords that have been stolen as part of a data hack or exposure. Based on our research, we estimate that 15 percent of users have had their account credentials compromised.

One fact that exacerbates this situation is that many people reuse their passwords for multiple accounts. Research suggests that as many as half of all users, and often more, do this. Combine that with the fact that a high number of your enterprise users log into your popular cloud-based apps like Salesforce, Box, Dropbox, Concur, and WebEx. Even if you’re diligent about protecting those apps, the chances are high that one of those users is logging into your business-critical apps with compromised credentials, even if the compromise had nothing to do with those apps or your protection of them.

How can you protect your business-critical apps given this situation? We recommend five things:

  • Discover all of your business-critical cloud apps. As you move to secure all of the cloud apps that you deem important or house sensitive data, reach beyond apps you know. IT typically underestimates cloud usage by about 90 percent. Of course, not all apps in use are going to be business-critical. But some are. Before applying security controls, make sure you identify which apps need protection.
  • Secure access to your business-critical apps with multi-factor authentication. Ensure that users accessing your apps are really who they claim to be, and be able to prove it after the fact.
  • Consider using single sign-on for your business-critical apps. SSO will enable you to easily manage access to your most important apps and will take password guesswork out of your users’ hands, all while making their lives easier.
  • Monitor granular user and admin activities. Ensure that you can go back after suspicious activity and easily construct an audit trail on who did what in your business-critical cloud apps. This means who downloaded client records from Salesforce, who shared sensitive content from your sanctioned cloud storage app, and so on.
  • Keep an eye out for anomalies. Excessive downloads or shares or out-of-the-ordinary access patterns may signal compromised credentials. Make sure you are watching for anomalies across all of your cloud apps, especially your business-critical ones, and that you instrument in alerts so you can take immediate action.

It’s nearly impossible to protect your users from having their credentials compromised. But there are some very clear steps you can take to protect your most business-critical apps and the data they house. Learn more about this topic and other cloud usage statistics in the Netskope Cloud Report.

Connettiti con Netskope

Iscriviti al blog di Netskope

Iscriviti per ricevere ogni mese una panoramica degli ultimi contenuti di Netskope direttamente nella tua casella di posta.