Netskope named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Service Edge. Get the Report.

  • プラットフォーム

    世界最大のセキュリティプライベートクラウドでの比類のない可視性とリアルタイムデータおよび脅威保護。

  • 製品

    Netskope製品は、NetskopeSecurityCloud上に構築されています。

Netskope は、データと脅威の保護、および安全なプライベートアクセスを実現するための機能を統合した、最新のクラウドセキュリティスタックを提供します。

プラットフォームを探索する
Birds eye view metropolitan city

ネットスコープ、2022年Gartner社のセキュリティ・サービス・エッジ(SSE)のマジック・クアドラントでリーダーの1社と位置付けられる

レポートを読む 製品概要に移動
Netskope gartner mq 2022 sse leader
  • 変身

    デジタルトランスフォーメーションを保護します。

  • セキュリティの近代化

    今日と明日のセキュリティの課題に対応します。

  • フレームワーク

    サイバーセキュリティを形作る規制の枠組みを採用する。

  • 業界ソリューション

    Netskopeは、クラウドに安全に移行するためのプロセスを世界最大規模の企業に提供しています。

最小の遅延と高い信頼性を備えた、市場をリードするクラウドセキュリティサービスに移行します。

詳しくはこちら
Lighted highway through mountainside switchbacks

シングルパスSSEフレームワークを使用して、他のセキュリティソリューションを回避することが多い脅威を防止します。

詳しくはこちら
Lighting storm over metropolitan area

SSEおよびSASE展開のためのゼロトラストソリューション

詳しくはこちら
Boat driving through open sea

Netskopeは、クラウドサービス、アプリ、パブリッククラウドインフラストラクチャを採用するための安全でクラウドスマートかつ迅速な旅を可能にします。

詳しくはこちら
Wind turbines along cliffside
  • お客様の成功事例

    デジタルトランスフォーメーションの旅を保護し、クラウド、Web、およびプライベートアプリケーションを最大限に活用します。

  • カスタマーサポート

    Netskope環境を最適化し、成功を加速するためのプロアクティブなサポートとエンゲージメント。

  • トレーニングと認定

    Netskope training will help you become a cloud security expert.

Netskopeを信頼して、進化する脅威、新しいリスク、テクノロジーの変化、組織とネットワークの変更、および新しい規制要件への対応を支援してください。

詳しくはこちら
Woman smiling with glasses looking out window

クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発のさまざまなバックグラウンドを持つ世界中の資格のあるエンジニアが、タイムリーで高品質の技術支援を提供する準備ができています。

詳しくはこちら
Bearded man wearing headset working on computer

Netskopeトレーニングで、デジタルトランスフォーメーションの旅を保護し、クラウド、ウェブ、プライベートアプリケーションを最大限に活用してください。

詳しくはこちら
Group of young professionals working
  • リソース

    クラウドへ安全に移行する上でNetskopeがどのように役立つかについての詳細は、以下をご覧ください。

  • ブログ

    Netskopeがセキュリティサービスエッジ(SSE)を通じてセキュリティとネットワークの変革を可能にする方法を学びましょう。

  • イベント&ワークショップ

    最新のセキュリティトレンドを先取りし、仲間とつながりましょう。

  • 定義されたセキュリティ

    サイバーセキュリティ百科事典で知っておくべきことすべて。

セキュリティビジョナリーポッドキャスト

ボーナスエピソード:セキュリティサービスエッジ(SSE)の重要性

ポッドキャストを再生する
Black man sitting in conference meeting

Netskopeがセキュリティサービスエッジ(SSE)機能を介してゼロトラストおよびSASEジャーニーを実現する方法に関する最新情報をお読みください。

ブログを読む
Sunrise and cloudy sky

NetskopeCSOスピーキングイベント

今後のイベントの1つでNetskopeCSOチームに会いましょう。

イベントを探す
Netskope CSO Team

セキュリティサービスエッジとは何ですか?

SASEのセキュリティ面、ネットワークとクラウドでの保護の未来を探ります。

詳しくはこちら
Four-way roundabout
  • 会社概要

    クラウド、データ、ネットワークのセキュリティの課題を先取りするお手伝いをします。

  • ネットスコープが選ばれる理由

    クラウドの変革とどこからでも機能することで、セキュリティの機能方法が変わりました。

  • リーダーシップ

    ネットスコープの経営陣はお客様を成功に導くために全力を尽くしています。

  • パートナー

    私たちはセキュリティリーダーと提携して、クラウドへの旅を保護します。

Netskopeは仕事の未来を可能にします。

詳しくはこちら
Curvy road through wooded area

Netskopeは、組織がゼロトラストの原則を適用してデータを保護できるように、クラウド、データ、およびネットワークのセキュリティを再定義しています。

詳しくはこちら
Switchback road atop a cliffside

思想家、建築家、夢想家、革新者。 一緒に、私たちはお客様がデータと人々を保護するのを助けるために最先端のクラウドセキュリティソリューションを提供します。

私たちのチームに会う
Group of hikers scaling a snowy mountain

Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。

詳しくはこちら
Group of diverse young professionals smiling
ブログ CSO, Full Skope Break Up the IT Block Party: Facilitating Healthcare Collaboration
Aug 31 2021

Break Up the IT Block Party: Facilitating Healthcare Collaboration

Healthcare organizations still seem to think that blocking all access to unapproved cloud storage or cloud collaboration tools means that they’re preventing leakage of sensitive information. But as the old saying goes, “Data flows like water.” Eventually, it’s going to find the holes and escape. 

Even if a healthcare IT system has water-tight data controls, that’s not the only goal within the organization—and not even the most important one. When blocking prevents a clinician from doing their job to the best of their abilities, data is especially hard to contain.

The need for more, and better, collaboration in healthcare 

Today, a lot of health organizations are working to become more collaborative across doctors and teams to improve the quality of care and improve outcomes for patients. If I were a patient undergoing treatment, I would want to make sure that my primary care physician, my specialists, and all the different services and facilities involved across the medical treatment ecosystem would have access to all the necessary information to help resolve my illness. In fact, that’s one of the main transformative benefits that digital tools have brought to medicine in recent years.

Patients expect that all the different care providers they need are working together to solve their health problems. But the whole idea of blocking data sharing as a default institutional policy limits the ability for healthcare providers to operate as a nimble, coordinated unit. In order to collaborate, sensitive patient data needs to be shared—across departments and oftentimes outside the institution. And this kind of sharing has historically been a problem for healthcare security. Security teams tend to block first and ask questions later.

Managing data risks shouldn’t be all or nothing

Why would we want to prevent sharing of patient information among the people who need to use it? Blocking collaboration tools or access to data sources outside the organization’s control might limit the risk of data loss, but it also sets us back in the core objective of treating patients with the best available resources.

Here’s a good example. Let’s say the only managed cloud application for collaboration at our hospital is Microsoft OneDrive. The hospital’s security team blocks access to all other services (e.g., Dropbox, Google Drive, Box) to ensure that private patient data/PII can’t be exfiltrated via those tools. But what if a doctor is collaborating with a major research university on a specialized course of treatment, and that institution only allows access via Dropbox? 

So, now we have a problem. Rigid data blocking policies are hampering cross-institutional collaboration and the best treatment for a patient, whether the data in question contains sensitive information or not. Maybe it’s just communications back and forth between the hospital and the university. Shouldn’t they be automatically allowed to collaborate across different cloud platforms under benign circumstances, rather than wasting time for one side or the other to request and wait for an approved exception from IT/security?

In this case, the hospital says that clinicians can’t go to Dropbox and the university says researchers can’t go OneDrive because of overly rigid data policies. And rigid systems break—doctors who are committed to patient care will find workarounds—via Shadow IT, where data may be moving outside the institution anyway. We need to stop blocking everything for the sake of transparent, collaborative patient care. The only way we can do this is to allow providers to do the things that they need to do.

 “Allow” is the new “block”

Modern healthcare organizations can start down the path of facilitating cooperative care by first gaining visibility into the data and the users who are seeking access to the cloud and collaboration tools. Once we have visibility, then we can apply granular controls around what users can and can’t do based on the content of the file and based on the action that they’re trying to make. 

Back to the previous example of the hospital working with the research university. We can apply a group policy that allows our hospital clinicians to go to the university’s Dropbox account to view or download shared research findings, but the policy may block them from being able to upload anything. Or we can take it a step further and say our clinicians can also upload files—unless they contain protected health information (PHI) or personally identifiable information (PII) data. If that attempt is made, security controls would automatically block the user from being able to send out these specific files.

By establishing visibility and implementing policy-based granular controls, the organization can move forward with transparent collaboration—whereas before, the universal block policy left everyone at a standstill.

The challenge of multiple user instances

Another thing that many hospitals don’t realize is that by allowing their users to go to Office 365 or Google Workspace, those users could potentially be going to another instance of those cloud applications. 

To use another common example, let’s say you’re a doctor on contract with a local hospital, but you also have your own private practice. You may come in and access your hospital-sanctioned instance of Office 365—but one day, you also need access to your private practice Office 365 instance to check on something else. By allowing users into Office 365 as a default policy, the hospital very often isn’t able to see which instance you’re actually accessing. You could be connecting to reference test results for an outside patient, or you could be uploading patient PII. The hospital may not be able to see enough to know what’s actually transpiring—let alone do anything to control it.

So how can hospitals gain visibility to discern a doctor’s private Office 365 instance from one that’s managed to use within the hospital? They need security with instance-aware visibility and granular controls. Policies can be set so that a contractor can come into the hospital, view their private instances for reference, but they can’t upload anything. Or maybe just not anything that contains sensitive or private information. 

Security that enables this kind of adaptive trust is what healthcare needs to embrace in order to make flexible collaboration and appropriate information sharing possible—without introducing undue risks to patients or institutions.

The block party is over: Secure collaboration starts today

It’s important to remember, data flows like water—it will find any available gap to escape. Clinicians will find ways to bypass any security controls that appear to get in the way of their primary objective—providing patients with the best possible care and saving lives.

Security for healthcare now needs to focus on visibility and control so conversations can shift from just a standard “no”  into policies that mitigate risks without inhibiting teamwork. Ten years from now, healthcare CISOs are going to look back and say, “Remember when we used to just block everything?” To serve patients and save lives, that evolution needs to start today. And fortunately, there are already security solutions for transparent visibility and granular control available to help make it possible.

This article was originally published at Healthcare IT Today

author image
About the author
Damian Chung is a cybersecurity leader with over ten years of security experience focused in healthcare. As the Business Information Security Officer at Netskope, Damian is responsible for overseeing corporate security tools and processes and acts as the subject matter expert in the healthcare vertical. He also serves as an adjunct professor for the cybersecurity program at the University of Advancing Technologies in Tempe, AZ.
Damian Chung is a cybersecurity leader with over ten years of security experience focused in healthcare. As the Business Information Security Officer at Netskope, Damian is responsible for overseeing corporate security tools and processes and acts as the subject matter expert in the healthcare vertical. He also serves as an…