ãƒãƒƒãƒˆã‚¹ã‚³ãƒ¼ãƒ—ã€2024å¹´Gartner®社ã®ã‚·ãƒ³ã‚°ãƒ«ãƒ™ãƒ³ãƒ€ãƒ¼SASEã®ãƒžã‚¸ãƒƒã‚¯ãƒ»ã‚¯ã‚¢ãƒ‰ãƒ©ãƒ³ãƒˆã§ãƒªãƒ¼ãƒ€ãƒ¼ã®1社ã®ä½ç½®ä»˜ã‘ã¨è©•ä¾¡ レãƒãƒ¼ãƒˆã‚’読む

é–‰ã‚ã‚‹
é–‰ã‚ã‚‹
  • NetskopeãŒé¸ã°ã‚Œã‚‹ç†ç”± シェブロン

    ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã¨ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã®é€£æºæ–¹æ³•ã‚’変ãˆã‚‹ã€‚

  • å°Žå…¥ä¼æ¥­ シェブロン

    Netskopeã¯ã€ãƒ•ã‚©ãƒ¼ãƒãƒ¥ãƒ³100社ã®30社以上をå«ã‚€ã€ä¸–界中ã§3,400社以上ã®é¡§å®¢ã«ã‚µãƒ¼ãƒ“スをæä¾›ã—ã¦ã„ã¾ã™ã€‚

  • パートナー シェブロン

    ç§ãŸã¡ã¯ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒªãƒ¼ãƒ€ãƒ¼ã¨ææºã—ã¦ã€ã‚¯ãƒ©ã‚¦ãƒ‰ã¸ã®æ—…ã‚’ä¿è­·ã—ã¾ã™ã€‚

SSEã®ãƒªãƒ¼ãƒ€ãƒ¼ï¼ã‚·ãƒ³ã‚°ãƒ«ãƒ™ãƒ³ãƒ€ãƒ¼SASEã®ãƒªãƒ¼ãƒ€ãƒ¼ï¼

ãƒãƒƒãƒˆã‚¹ã‚³ãƒ¼ãƒ—ãŒ2024å¹´Gartner®社ã®ã‚·ãƒ³ã‚°ãƒ«ãƒ™ãƒ³ãƒ€ãƒ¼SASEã®ãƒžã‚¸ãƒƒã‚¯ãƒ»ã‚¯ã‚¢ãƒ‰ãƒ©ãƒ³ãƒˆã§ãƒªãƒ¼ãƒ€ãƒ¼ã®1社ã®ä½ç½®ä»˜ã‘ã¨è©•ä¾¡ã•ã‚ŒãŸç†ç”±ã‚’ã”覧ãã ã•ã„。

レãƒãƒ¼ãƒˆã‚’読む
顧客ビジョナリースãƒãƒƒãƒˆãƒ©ã‚¤ãƒˆ

é©æ–°çš„ãªé¡§å®¢ãŒ Netskope One プラットフォームを通ã˜ã¦ã€ä»Šæ—¥ã®å¤‰åŒ–ã™ã‚‹ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã¨ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã®çŠ¶æ³ã‚’ã©ã®ã‚ˆã†ã«ã†ã¾ã乗り越ãˆã¦ã„ã‚‹ã‹ã‚’ã”覧ãã ã•ã„。

é›»å­æ›¸ç±ã‚’入手ã™ã‚‹
顧客ビジョナリースãƒãƒƒãƒˆãƒ©ã‚¤ãƒˆ
Netskopeã®ãƒ‘ートナー中心ã®å¸‚場開拓戦略ã«ã‚ˆã‚Šã€ãƒ‘ートナーã¯ä¼æ¥­ã®ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã‚’変é©ã—ãªãŒã‚‰ã€æˆé•·ã¨åŽç›Šæ€§ã‚’最大化ã§ãã¾ã™ã€‚

Netskope パートナーã«ã¤ã„ã¦å­¦ã¶
色々ãªè‹¥ã„専門家ãŒé›†ã†ç¬‘é¡”ã®ã‚°ãƒ«ãƒ¼ãƒ—
  • Netskope One プラットフォーム シェブロン

    Netskope One ã¯ã€ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã¨ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã‚’サービスã¨ã—ã¦çµ±åˆã—ãŸãƒ—ラットフォームã§ã™ã€‚

  • Netskope One プラットフォームã®æ©Ÿèƒ½ シェブロン

    Netskope One ã¯ã€è¶…高速ã¨ä¿¡é ¼æ€§ã®é«˜ã„回復力ã«ã‚ˆã‚Šã€ãƒ“ジãƒã‚¹ã®ä¿Šæ•æ€§ã‚’高ã‚ã¾ã™ã€‚

  • NewEdge シェブロン

    NewEdgeã¯ã€ä¸–界最大ã‹ã¤æœ€é«˜ã®ãƒ‘フォーマンスを誇るセキュリティプライベートクラウドã§ã™ã€‚

  • 技術パートナーã¨çµ±åˆ シェブロン

    Netskopeã¯ã€ã‚¨ãƒ³ã‚¿ãƒ¼ãƒ—ライズテクノロジーã®æœ€å¼·ã®ä¼æ¥­ã¨ææºã—ã¦ã„ã¾ã™ã€‚

明日ã«å‘ã‘ãŸãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯

サãƒãƒ¼ãƒˆã™ã‚‹ã‚¢ãƒ—リケーションã¨ãƒ¦ãƒ¼ã‚¶ãƒ¼å‘ã‘ã«è¨­è¨ˆã•ã‚ŒãŸã€ã‚ˆã‚Šé«˜é€Ÿã§ã€ã‚ˆã‚Šå®‰å…¨ã§ã€å›žå¾©åŠ›ã®ã‚ã‚‹ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã¸ã®é“を計画ã—ã¾ã™ã€‚

ホワイトペーパーã¯ã“ã¡ã‚‰
明日ã«å‘ã‘ãŸãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯
Netskope One プラットフォームã®ç´¹ä»‹

Netskope One ã¯ã€SASE ã¨ã‚¼ãƒ­ãƒˆãƒ©ã‚¹ãƒˆå¤‰é©ã‚’å¯èƒ½ã«ã™ã‚‹çµ±åˆåž‹ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãŠã‚ˆã³ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚­ãƒ³ã‚° サービスをæä¾›ã™ã‚‹ã‚¯ãƒ©ã‚¦ãƒ‰ãƒã‚¤ãƒ†ã‚£ãƒ– プラットフォームã§ã™ã€‚

Netskope One ã«ã¤ã„ã¦å­¦ã¶
é’ã„照明ã®æŠ½è±¡ç”»
セキュアアクセスサービスエッジ(SASE)アーキテクãƒãƒ£ã®æŽ¡ç”¨

Netskope NewEdgeã¯ã€ä¸–界最大ã‹ã¤æœ€é«˜ã®ãƒ‘フォーマンスã®ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ—ライベートクラウドã§ã‚ã‚Šã€æ¯”é¡žã®ãªã„サービスカãƒãƒ¬ãƒƒã‚¸ã€ãƒ‘フォーマンスã€ãŠã‚ˆã³å›žå¾©åŠ›ã‚’顧客ã«æä¾›ã—ã¾ã™ã€‚

NewEdgeã®è©³ç´°
NewEdge
Netskope Cloud Exchange

Netskope Cloud Exchange (CE) ã¯ã€ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒã‚¹ãƒãƒ£ã«å¯¾ã™ã‚‹æŠ•è³‡ã‚’活用ã™ã‚‹ãŸã‚ã®å¼·åŠ›ãªçµ±åˆãƒ„ールをæä¾›ã—ã¾ã™ã€‚

Cloud Exchangeã«ã¤ã„ã¦å­¦ã¶
Netskopeã®å‹•ç”»
  • ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã‚µãƒ¼ãƒ“ã‚¹ã‚¨ãƒƒã‚¸è£½å“ ã‚·ã‚§ãƒ–ãƒ­ãƒ³

    高度ãªã‚¯ãƒ©ã‚¦ãƒ‰å¯¾å¿œã®è„…å¨ã‹ã‚‰ä¿è­·ã—ã€ã‚らゆるベクトルã«ã‚ãŸã£ã¦ãƒ‡ãƒ¼ã‚¿ã‚’ä¿è­·

  • Borderless SD-WAN シェブロン

    ã™ã¹ã¦ã®ãƒªãƒ¢ãƒ¼ãƒˆãƒ¦ãƒ¼ã‚¶ãƒ¼ã€ãƒ‡ãƒã‚¤ã‚¹ã€ã‚µã‚¤ãƒˆã€ã‚¯ãƒ©ã‚¦ãƒ‰ã¸å®‰å…¨ã§é«˜æ€§èƒ½ãªã‚¢ã‚¯ã‚»ã‚¹ã‚’æä¾›

  • Secure Access Service Edge シェブロン

    Netskope One SASE ã¯ã€ã‚¯ãƒ©ã‚¦ãƒ‰ãƒã‚¤ãƒ†ã‚£ãƒ–ã§å®Œå…¨ã«çµ±åˆã•ã‚ŒãŸå˜ä¸€ãƒ™ãƒ³ãƒ€ãƒ¼ã® SASE ソリューションをæä¾›ã—ã¾ã™ã€‚

未æ¥ã®ãƒ—ラットフォームã¯Netskopeã§ã™

インテリジェントセキュリティサービスエッジ(SSE)ã€ã‚¯ãƒ©ã‚¦ãƒ‰ã‚¢ã‚¯ã‚»ã‚¹ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ–ローカー(CASB)ã€ã‚¯ãƒ©ã‚¦ãƒ‰ãƒ•ã‚¡ã‚¤ã‚¢ã‚¦ã‚©ãƒ¼ãƒ«ã€ã‚»ã‚­ãƒ¥ã‚¢ã‚¦ã‚§ãƒ–ゲートウェイ(SWG)ã€ãŠã‚ˆã³ZTNAã®ãƒ—ライベートアクセスã¯ã€å˜ä¸€ã®ã‚½ãƒªãƒ¥ãƒ¼ã‚·ãƒ§ãƒ³ã«ãƒã‚¤ãƒ†ã‚£ãƒ–ã«çµ„ã¿è¾¼ã¾ã‚Œã¦ãŠã‚Šã€ã‚»ã‚­ãƒ¥ã‚¢ã‚¢ã‚¯ã‚»ã‚¹ã‚µãƒ¼ãƒ“スエッジ(SASE)アーキテクãƒãƒ£ã¸ã®é“ã®ã‚Šã§ã™ã¹ã¦ã®ãƒ“ジãƒã‚¹ã‚’支æ´ã—ã¾ã™ã€‚

製å“概è¦ã¯ã“ã¡ã‚‰
Netskopeã®å‹•ç”»
Next Gen SASE Branch ã¯ãƒã‚¤ãƒ–リッドã§ã‚る:接続ã€ä¿è­·ã€è‡ªå‹•åŒ–

Netskope Next Gen SASE Branchã¯ã€ã‚³ãƒ³ãƒ†ã‚­ã‚¹ãƒˆã‚¢ã‚¦ã‚§ã‚¢SASEファブリックã€ã‚¼ãƒ­ãƒˆãƒ©ã‚¹ãƒˆãƒã‚¤ãƒ–リッドセキュリティ〠SkopeAI-Powered Cloud Orchestrator ã‚’çµ±åˆã‚¯ãƒ©ã‚¦ãƒ‰è£½å“ã«çµ±åˆã—ã€ãƒœãƒ¼ãƒ€ãƒ¬ã‚¹ã‚¨ãƒ³ã‚¿ãƒ¼ãƒ—ライズå‘ã‘ã«å®Œå…¨ã«æœ€æ–°åŒ–ã•ã‚ŒãŸãƒ–ランãƒã‚¨ã‚¯ã‚¹ãƒšãƒªã‚¨ãƒ³ã‚¹ã‚’実ç¾ã—ã¾ã™ã€‚

Next Gen SASE Branchã®è©³ç´°ã¯ã“ã¡ã‚‰
オープンスペースオフィスã®æ§˜å­
SASEアーキテクãƒãƒ£ã®è¨­è¨ˆ For Dummies

SASE設計ã«ã¤ã„ã¦ç¶²ç¾…ã—ãŸé›»å­æ›¸ç±ã‚’ç„¡å„Ÿã§ãƒ€ã‚¦ãƒ³ãƒ­ãƒ¼ãƒ‰

é›»å­æ›¸ç±ã‚’入手ã™ã‚‹
最å°ã®é…延ã¨é«˜ã„信頼性を備ãˆãŸã€å¸‚場をリードã™ã‚‹ã‚¯ãƒ©ã‚¦ãƒ‰ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã‚µãƒ¼ãƒ“スã«ç§»è¡Œã—ã¾ã™ã€‚

NewEdgeã®è©³ç´°
山腹ã®ã‚¹ã‚¤ãƒƒãƒãƒãƒƒã‚¯ã‚’通るライトアップã•ã‚ŒãŸé«˜é€Ÿé“è·¯
アプリケーションã®ã‚¢ã‚¯ã‚»ã‚¹åˆ¶å¾¡ã€ãƒªã‚¢ãƒ«ã‚¿ã‚¤ãƒ ã®ãƒ¦ãƒ¼ã‚¶ãƒ¼ã‚³ãƒ¼ãƒãƒ³ã‚°ã€ã‚¯ãƒ©ã‚¹æœ€é«˜ã®ãƒ‡ãƒ¼ã‚¿ä¿è­·ã«ã‚ˆã‚Šã€ç”Ÿæˆåž‹AIアプリケーションを安全ã«ä½¿ç”¨ã§ãるよã†ã«ã—ã¾ã™ã€‚

生æˆAIã®ä½¿ç”¨ã‚’ä¿è­·ã™ã‚‹æ–¹æ³•ã‚’å­¦ã¶
ChatGPTã¨ç”ŸæˆAIを安全ã«æœ‰åŠ¹ã«ã™ã‚‹
SSEãŠã‚ˆã³SASE展開ã®ãŸã‚ã®ã‚¼ãƒ­ãƒˆãƒ©ã‚¹ãƒˆã‚½ãƒªãƒ¥ãƒ¼ã‚·ãƒ§ãƒ³

ゼロトラストã«ã¤ã„ã¦å­¦ã¶
大海原を走るボート
NetskopeãŒFedRAMPã®é«˜èªè¨¼ã‚’é”æˆ

政府機関ã®å¤‰é©ã‚’加速ã™ã‚‹ã«ã¯ã€Netskope GovCloud ã‚’é¸æŠžã—ã¦ãã ã•ã„。

Netskope GovCloud ã«ã¤ã„ã¦å­¦ã¶
Netskope GovCloud
  • リソース シェブロン

    クラウドã¸å®‰å…¨ã«ç§»è¡Œã™ã‚‹ä¸Šã§NetskopeãŒã©ã®ã‚ˆã†ã«å½¹ç«‹ã¤ã‹ã«ã¤ã„ã¦ã®è©³ç´°ã¯ã€ä»¥ä¸‹ã‚’ã”覧ãã ã•ã„。

  • ブログ シェブロン

    NetskopeãŒã‚»ã‚­ãƒ¥ã‚¢ã‚¢ã‚¯ã‚»ã‚¹ã‚µãƒ¼ãƒ“スエッジ(SASE)を通ã˜ã¦ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã¨ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚­ãƒ³ã‚°ã®å¤‰é©ã‚’実ç¾ã™ã‚‹æ–¹æ³•ã‚’ã”覧ãã ã•ã„

  • イベント&ワークショップ シェブロン

    最新ã®ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒˆãƒ¬ãƒ³ãƒ‰ã‚’å…ˆå–ã‚Šã—ã€ä»²é–“ã¨ã¤ãªãŒã‚Šã¾ã—ょã†ã€‚

  • 定義ã•ã‚ŒãŸã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ シェブロン

    サイãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ç™¾ç§‘事典ã€çŸ¥ã£ã¦ãŠãã¹ãã™ã¹ã¦ã®ã“ã¨

「セキュリティビジョナリーã€ãƒãƒƒãƒ‰ã‚­ãƒ£ã‚¹ãƒˆ

Data Lakes, Security, & Innovation
Max Havey ãŒã€Interpublic Group (IPG) ã® CISO ã§ã‚ã‚‹ Troy Wilkinson æ°ã‚’ゲストã«è¿Žãˆã€ãƒ‡ãƒ¼ã‚¿ãƒ¬ã‚¤ã‚¯ã®ä¸–界を深ã掘り下ã’ã¾ã™ã€‚

ãƒãƒƒãƒ‰ã‚­ãƒ£ã‚¹ãƒˆã‚’å†ç”Ÿã™ã‚‹ Browse all podcasts
Data Lakes, Security, & Innovation
最新ã®ãƒ–ログ

NetskopeãŒã‚»ã‚­ãƒ¥ã‚¢ã‚¢ã‚¯ã‚»ã‚¹ã‚µãƒ¼ãƒ“スエッジ(SASE)機能を通ã˜ã¦ã‚¼ãƒ­ãƒˆãƒ©ã‚¹ãƒˆã¨SASEã®æ—…ã‚’ã©ã®ã‚ˆã†ã«å®Ÿç¾ã§ãã‚‹ã‹ã‚’ãŠèª­ã¿ãã ã•ã„。

ブログを読む
æ—¥ã®å‡ºã¨æ›‡ã‚Šç©º
SASE Week 2024

SASE ã¨ã‚¼ãƒ­ãƒˆãƒ©ã‚¹ãƒˆã®æœ€æ–°ã®é€²æ­©ã‚’ç†è§£ã—ã€ã“れらã®ãƒ•ãƒ¬ãƒ¼ãƒ ãƒ¯ãƒ¼ã‚¯ãŒã‚µã‚¤ãƒãƒ¼ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã¨ã‚¤ãƒ³ãƒ•ãƒ©ã‚¹ãƒˆãƒ©ã‚¯ãƒãƒ£ã®èª²é¡Œã«å¯¾å‡¦ã™ã‚‹ãŸã‚ã«ã©ã®ã‚ˆã†ã«é©å¿œã—ã¦ã„ã‚‹ã‹ã‚’探りã¾ã™ã€‚

セッションã®è©³ç´°
SASE Week 2024
SASEã¨ã¯

クラウド優ä½ã®ä»Šæ—¥ã®ãƒ“ジãƒã‚¹ãƒ¢ãƒ‡ãƒ«ã«ãŠã„ã¦ã€ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã¨ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ„ールã®ä»Šå¾Œã®èžåˆã«ã¤ã„ã¦å­¦ã³ã¾ã™ã€‚

SASEã«ã¤ã„ã¦å­¦ã¶
データセキュリティã«ã‚ˆã‚‹æŒç¶šå¯èƒ½æ€§ã®ã‚µãƒãƒ¼ãƒˆ

Netskope ã¯ã€æŒç¶šå¯èƒ½æ€§ã«ãŠã‘ã‚‹æ°‘é–“ä¼æ¥­ã®å½¹å‰²ã«ã¤ã„ã¦ã®èªè­˜ã‚’高ã‚ã‚‹ã“ã¨ã‚’目的ã¨ã—ãŸã‚¤ãƒ‹ã‚·ã‚¢ãƒãƒ–ã§ã‚る「ビジョン2045ã€ã«å‚加ã§ãã‚‹ã“ã¨ã‚’誇りã«æ€ã£ã¦ã„ã¾ã™ã€‚

詳ã—ãã¯ã“ã¡ã‚‰
データセキュリティã«ã‚ˆã‚‹æŒç¶šå¯èƒ½æ€§ã®ã‚µãƒãƒ¼ãƒˆ
Netskopeã®æœ‰èƒ½ã§çµŒé¨“豊富ãªãƒ—ロフェッショナルサービスãƒãƒ¼ãƒ ã¯ã€å®Ÿè£…ã‚’æˆåŠŸã•ã›ã‚‹ãŸã‚ã®è¦ç¯„çš„ãªã‚¢ãƒ—ローãƒã‚’æä¾›ã—ã¾ã™ã€‚

プロフェッショナルサービスã«ã¤ã„ã¦å­¦ã¶
Netskopeプロフェッショナルサービス
Netskopeトレーニングã§ã€ãƒ‡ã‚¸ã‚¿ãƒ«ãƒˆãƒ©ãƒ³ã‚¹ãƒ•ã‚©ãƒ¼ãƒ¡ãƒ¼ã‚·ãƒ§ãƒ³ã®æ—…ã‚’ä¿è­·ã—ã€ã‚¯ãƒ©ã‚¦ãƒ‰ã€ã‚¦ã‚§ãƒ–ã€ãƒ—ライベートアプリケーションを最大é™ã«æ´»ç”¨ã—ã¦ãã ã•ã„。

トレーニングã¨èªå®šè³‡æ ¼ã«ã¤ã„ã¦å­¦ã¶
åƒãè‹¥ã„専門家ã®ã‚°ãƒ«ãƒ¼ãƒ—

Cloud Threats Memo: Multiple Different Cloud Apps Abused in a Single Cyber Espionage Campaign

Mar 03 2023

Threat actors continue to exploit cloud services for cyber espionage, and a new campaign by a threat cluster named WIP26, discovered recently by researchers at Sentinel One in collaboration with QGroup, targeting telecommunication providers in the Middle East, confirms this trend. 

In particular what makes this campaign stand out is the abuse of multiple cloud services in different stages of the kill chain in an attempt to evade detection by making malicious traffic look legitimate, making life harder for defenders. Dropbox and Microsoft Azure are exploited to host and distribute the malware payload (Microsoft Azure is also abused to exfiltrate data), whereas the command and control infrastructure relies on two additional cloud services, Microsoft 365 Mail and Google Firebase. In practice, the campaign is based exclusively on the weaponization of legitimate cloud services. Personally this is the first time I’ve seen four different cloud services exploited in the same campaign.

The initial attack vector involves the delivery of targeted WhatsApp messages containing Dropbox links to archive files that supposedly contain documents on poverty issues in the Middle East, as well as a malware loader masquerading as the PDFelement application. There are two elements in this modus operandi that are normally leveraged by threat actors: it’s easier to trick the victims by delivering the malicious links on a mobile device, and, despite all the warnings, users tend to install applications from any origin, without checking the legitimacy.

The malware loader deploys a backdoor called CMD365, which executes commands from a Microsoft 365 Mail instance using the Microsoft Graph API (a technique used in several cyber espionage campaigns) and exfiltrates data to a Microsoft Azure instance. Among the malware deployed on compromised machines, there is also an additional sample called CMDEmber, which uses Google Firebase as the command and control server.

How Netskope mitigates the risk of legitimate cloud services exploited to deliver malware

Dropbox, Microsoft Azure, Microsoft Office 365 Suite (where Microsoft 365 Mail belongs), and Google Firebase are among the thousands of services where the Netskope Next Gen SWG can provide granular access control, threat protection, and DLP capabilities. Dropbox and the Microsoft applications are also among the hundreds of services for which instance detection is available.

In those cases, where a cloud service is exploited to host the command and control, it is possible to configure a policy that prevents potentially dangerous activities (such as upload and download) for unmanaged cloud services or non-corporate instances of managed cloud services.

To defend against attacks where a legitimate cloud service is exploited to distribute malware, it is possible to configure a policy that prevents potentially dangerous activities (such as download) from non-corporate instances, or in general from any unneeded cloud storage service for the enterprise.

Netskope customers are also protected against malware distributed from a legitimate cloud service and the web in general by Netskope Threat Protection. Netskope Threat Protection scans web and cloud traffic to detect known and unknown threats with a comprehensive set of engines, including signature-based AV, machine learning-based detectors for executables and Office documents, and sandboxing, including patient zero protection.

Netskope Cloud Exchange provides powerful integration tools to leverage investments across their security posture through integration with third-party tools, such as threat intelligence feeds and endpoint detection technologies.

Finally, Netskope Advanced Analytics provides specific dashboards to assess the risk of rogue cloud instances being exploited to deliver malware or becoming the target of anomalous communications, with rich details and insights, supporting security teams in the analysis and mitigation/remediation process.

You can subscribe to the Cloud Threats Memo mailing list at this link.

Stay safe!

author image
Paolo Passeri
Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.