Evento di Lancio: Smart AI Security. Controllo Totale dei Dati. Prenota il tuo posto

chiudere
chiudere
La tua rete di domani
La tua rete di domani
Pianifica il tuo percorso verso una rete più veloce, sicura e resiliente, progettata per le applicazioni e gli utenti che supporti.
Experience Netskope
Prova direttamente la piattaforma Netskope
Ecco la tua occasione per sperimentare in prima persona la piattaforma single-cloud di Netskope One. Iscriviti a laboratori pratici e a ritmo autonomo, unisciti a noi per dimostrazioni mensili di prodotti dal vivo, fai un test drive gratuito di Netskope Private Access o partecipa a workshop dal vivo guidati da istruttori.
Un leader in SSE. Ora è un leader nel settore SASE a singolo fornitore.
Netskope è riconosciuto come Leader Più Lontano in Visione sia per le piattaforme SSE che SASE
2 volte leader nel Quadrante Magico di Gartner® per piattaforme SASE
Una piattaforma unificata costruita per il tuo percorso
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Scopri come la tua organizzazione può bilanciare il potenziale innovativo dell'AI generativa con pratiche solide di sicurezza dei dati.
eBook sulla Modern Data Loss Prevention (DLP) for Dummies
Modern Data Loss Prevention (DLP) for Dummies
Ricevi consigli e trucchi per passare a un DLP fornito dal cloud.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Smettila di inseguire la tua architettura di rete
Comprendere dove risiede il rischio
Advanced Analytics trasforma il modo in cui i team di operazioni di sicurezza applicano insight basati sui dati per implementare policy migliori. Con l'Advanced Analytics, puoi identificare tendenze, concentrarti sulle aree di interesse e utilizzare i dati per agire.
Supporto tecnico Netskope
Supporto tecnico Netskope
I nostri ingegneri di supporto qualificati sono dislocati in tutto il mondo e possiedono competenze diversificate in sicurezza cloud, networking, virtualizzazione, content delivery e sviluppo software, garantendo un'assistenza tecnica tempestiva e di qualità.
Video Netskope
Formazione Netskope
La formazione Netskope ti aiuterà a diventare un esperto di sicurezza cloud. Siamo qui per aiutarti a proteggere il tuo percorso di trasformazione digitale e a sfruttare al meglio le tue applicazioni cloud, web e private.

Simplify and Scale Zero Trust Integrations with Netskope and CrowdStrike

Sep 14 2022

We’ve seen major shifts in the digital landscape that have far reaching implications on organizations around the world. These include the widespread adoption of hybrid work, the accelerated migration from on-premise to cloud resources, and the exponential increase of data in the cloud. 

While organizations gain many benefits from leveraging new cloud technologies, there are several challenges that arise with new ways of doing business, including the increasing complexity of an ever-expanding attack surface, the rising number of attacks targeting web and cloud apps, and protecting users, devices, and data regardless of where they reside. With hybrid work, employees and their devices have moved outside the traditional corporate network. Despite this shift, employees still need to do their jobs by securely using cloud and web apps their employers do not own, and the corporate data residing in the cloud must be protected. Organizations need visibility and control from endpoint to cloud services. 

The Netskope and CrowdStrike Joint Solution

The Netskope and CrowdStrike joint solution plays a critical role in enabling a cloud-first architecture of “remote” endpoints that directly access cloud resources. Netskope helps organizations stay ahead of cloud, data, and network security challenges by protecting people and data anywhere they go, regardless of how they access the internet. Netskope prevents critical data from leaving corporate control while protecting against cloud-launched threats targeting cloud services and connections. CrowdStrike provides robust endpoint protection with next generation antivirus, endpoint detection and response, and threat intelligence.

The Netskope and CrowdStrike joint solution is made possible by the Netskope Cloud Exchange platform. Cloud Exchange offers a suite of integration modules to enable cloud-based data and intelligence sharing across multiple security and IT functions so teams, processes, and systems can act faster, more efficiently, and more effectively to identify, respond to, and prevent threats.

Cloud Exchange extracts valuable Netskope threat and risk telemetry, as well as external threat intelligence and risk scores, which enable improved policy implementation, creation, and exportation of log events from the Netskope Security Cloud. Cloud Exchange gives customers the ability to improve their security posture and maximize the value of their existing investments by easily and seamlessly integrating components across their security stack, including Endpoint/EDR (like CrowdStrike Falcon), email, SIEM/XDR/UEBA (like CrowdStrike XDR), cloud storage, data lakes, IT service management, threat intelligence services, and other reachable services. 

Let’s deep dive into how Netskope Cloud Exchange works with the CrowdStrike solution by examining two use cases and how they positively impact joint customers. 

Use Cases 

Holistic Visibility and Control for XDR

Security teams deal with too many disparate tools and data points when trying to correlate a cyber-attack kill chain across multiple threat vectors. Their aim is to gain insight into how an attack was initiated, what next steps were taken, what was compromised, etc., across many different discrete pieces of data. Netskope Cloud Exchange enables real-time sharing of indicators of compromise between Netskope and CrowdStrike Falcon to immediately ensure that what one platform knows about highly targeted attacks, both platforms know and can act on, minimizing dwell time. The Netskope Cloud Exchange integration with CrowdStrike gives joint customers the additional cloud intelligence to know exactly what took place from the cloud point of view and what needs to be done to prevent it from happening again. The benefits to organizations include:

  • Gaining a holistic view of threats across endpoint and cloud
  • Automating the sharing of actionable threat information
  • Improving response times
  • Sharing up-to-the-minute, customer-specific intelligence feeds across endpoint and cloud

Improved Protection for Your Hybrid Workforce 

In hybrid work environments, remote employees need to perform their work off-site while organizations need to protect their data, which is also typically off-site. Employees may access the internet using a wide variety of devices in different ways. What constitutes safe cloud use in one situation (comprising a combination of variables), is not safe in other situations. For example, a low-risk employee using a company-issued laptop to download sensitive documents from the corporate shared drive (low-risk, acceptable) versus a risky employee using a personal device to download sensitive docs from the corporate shared drive (high-risk, unacceptable in most situations). 

The Netskope and CrowdStrike joint solution increases protection for the hybrid workforce by enforcing granular policies based on rich context such as device classification, user confidence information and host risk. It combines risk information from both Netskope and CrowdStrike and makes continuous adjustments in near-real-time. Our approach to risk is based on two layers of enforcement:

  1. Predefined policy: This is the “usual” policy that establishes a baseline or a starting point of normal, acceptable cloud resource use. For example, different policies are enforced for users on company-issued devices versus risky or non-protected devices. 
  1. Zero trust continuous compliance: We take it another step further by dynamically adjusting which policies apply based on continuously measured user and host risk that override the standard or predefined policy. How do we do that? For example, CrowdStrike knows when there’s malware on a device and Netskope knows when a user is risky, so we adjust the user and host profile to match a more restrictive policy. When risk is reduced on one or both elements, the user matches against a different set of policies that opens up activities and data. For example, an employee who can upload and download documents between the corporate Google Drive and her laptop during normal business loses her ability to make such uploads or downloads after getting malware on her laptop. However, she is still able to send emails, read documents and perform other such activities. As she regains the use of a safe host, she regains full rights.

The diagram below shows how Cloud Exchange facilitates these two use cases between Netskope and CrowdStrike:

In summary, the joint Netskope and CrowdStrike solution helps organizations in many ways, including: 

  • Empowering employees to perform their jobs from any location or device
  • Reducing the cost and complexity of managing multiple point solutions 
  • Enforcing security without sacrificing productivity
  • Streamlining threat response and enhancing overall protections

To learn more, join us at the Netskope session on September 20 at Fal.Con 2022. We look forward to seeing you in Las Vegas! 

author image
Lolita Chandra
Lolita Chandra is the Product Marketing Lead for Cloud Exchange and Tech Alliances. Lolita has 17 years of experience driving product marketing strategy and execution.
Lolita Chandra is the Product Marketing Lead for Cloud Exchange and Tech Alliances. Lolita has 17 years of experience driving product marketing strategy and execution.
Connettiti con Netskope

Iscriviti al blog di Netskope

Iscriviti per ricevere ogni mese una panoramica degli ultimi contenuti di Netskope direttamente nella tua casella di posta.