Netskopeは、2025年ガートナー、SASEプラットフォームのマジック・クアドラントで再びリーダーの1社として評価をいただきました。レポートを入手する

閉める
閉める
明日に向けたネットワーク
明日に向けたネットワーク
サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。
          Netskopeを体験しませんか?
          Netskopeプラットフォームを実際に体験する
          Netskope Oneのシングルクラウドプラットフォームを直接体験するチャンスです。自分のペースで進められるハンズオンラボにサインアップしたり、毎月のライブ製品デモに参加したり、Netskope Private Accessの無料試乗に参加したり、インストラクター主導のライブワークショップに参加したりできます。
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            Netskope、2024年ガートナー、シングルベンダーSASEのマジック・クアドラントでリーダーの1社の位置付けと評価された理由をご確認ください。
              ダミーのためのジェネレーティブAIの保護
              ダミーのためのジェネレーティブAIの保護
              ジェネレーティブ AI の革新的な可能性と堅牢なデータ セキュリティ プラクティスのバランスを取る方法をご覧ください。
                ダミーのための最新のデータ損失防止(DLP)eBook
                最新の情報漏えい対策(DLP)for Dummies
                クラウド配信型 DLP に移行するためのヒントとコツをご紹介します。
                  SASEダミーのための最新のSD-WAN ブック
                  SASEダミーのための最新のSD-WAN
                  遊ぶのをやめる ネットワークアーキテクチャに追いつく
                    リスクがどこにあるかを理解する
                    Advanced Analytics は、セキュリティ運用チームがデータ主導のインサイトを適用してより優れたポリシーを実装する方法を変革します。 Advanced Analyticsを使用すると、傾向を特定し、懸念事項に的を絞って、データを使用してアクションを実行できます。
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        Netskope One Private Accessは、VPNを永久に廃止できる唯一のソリューションです。
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                            Netskope GovCloud
                            NetskopeがFedRAMPの高認証を達成
                            政府機関の変革を加速するには、Netskope GovCloud を選択してください。
                              一緒に素晴らしいことをしましょう
                              Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。
                                ""
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange(CE)は、セキュリティ体制全体で投資を活用するための強力な統合ツールをお客様に提供します。
                                  Netskopeテクニカルサポート
                                  Netskopeテクニカルサポート
                                  クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発など、多様なバックグラウンドを持つ全世界にいる有資格のサポートエンジニアが、タイムリーで質の高い技術支援を行っています。
                                    Netskopeの動画
                                    Netskopeトレーニング
                                    Netskopeのトレーニングは、クラウドセキュリティのエキスパートになるためのステップアップに活用できます。Netskopeは、お客様のデジタルトランスフォーメーションの取り組みにおける安全確保、そしてクラウド、Web、プライベートアプリケーションを最大限に活用するためのお手伝いをいたします。

                                      Emergency Response: Navigating Through the Ivanti VPN Crisis Together

                                      Feb 05 2024

                                      Legacy VPNs have become a significant security liability for businesses and governments. VPNs require inbound access to corporate networks, significantly broadening the attack surface for malware. This makes them prime targets for threat actors, increasing the risk of disruption to your business. VPNs are built on a foundation of excessive implicit trust, which can inadvertently allow attackers to move laterally within a network and escalate privileges without detection, gaining access to high-value systems far beyond their initial point of entry. Perhaps most alarmingly, VPNs are plagued by a long history of software vulnerabilities that have been persistently exploited by both individual hackers and nation-state actors.

                                      CISA’s stark warning: “Just Disconnect” Ivanti Connect Secure VPN appliances

                                      The widely used VPN Ivanti Connect Secure, previously known as Pulse Secure, starkly highlights these security risks. In recent years, Ivanti Secure Connect has been the breeding ground for several zero-day vulnerabilities, which have been widely exploited, sometimes leading to devastating consequences. Now, Ivanti finds itself in the crosshairs once again, with attackers actively exploiting new zero-day vulnerabilities in its software.

                                      So, the pressing question arises: why is this happening now, and why do we believe VPNs are a clear and present danger? The root of the problem can be traced back to the age and evolution of VPN technology. Most legacy VPNs have been in use for decades and are burdened by mounting technical debt. Over time, their code bases have become a patchwork of outdated functions and piecemeal updates. We believe that this amalgamation of old and new code creates a snowball effect, leading to critical software vulnerabilities, such as the ones currently impacting Ivanti. 

                                       Even though Ivanti has rolled out its first round of patches for two known vulnerabilities (collectively nicknamed “ConnectAround”), it discovered two new critical vulnerabilities in the process and left many of its code versions unpatched. The situation reached a critical juncture last week, prompting the US Cybersecurity and Infrastructure Security Agency (CISA) to take an extraordinary step and issue an emergency directive to all federal agencies to disconnect all instances of at-risk Ivanti Connect Secure and Ivanti Policy Secure products from their networks as soon as possible (and no later than February 2, 2024). This move, while specifically directed at federal agencies, signals a broader message: the threats posed by these vulnerabilities loom large over all enterprises.

                                      Addressing the current crisis requires our immediate action (and at the end of this post we outline what we can do to help), but it’s equally critical to prevent future VPN-related crises. If history is a guide, zero-day vulnerabilities are not mere probabilities, they are inevitabilities. This harsh truth demands that we fundamentally change our approach to network security. It’s not enough to just patch up vulnerabilities as they emerge; we need to overhaul our security architecture to remove these risks entirely. Let’s break the cycle of endless vulnerability patching, and instead build a stronger, more resilient framework – now. 

                                      A clarion call to move beyond legacy VPNs

                                      Zero trust network access, or ZTNA, circumvents the challenges inherent to VPNs with a fundamentally different paradigm for delivering remote access. Instead of the traditional approach of connecting devices directly to the network, ZTNA offers a more secure approach of connecting users to applications through a trust broker.  In doing so, it is able to offer these significant advantages: 

                                      1. It significantly shrinks the attack surface by removing wide-open VPN tunnels that force you to open inbound listeners which can be exploited by attackers.
                                      2. It constrains unauthorized lateral movement by taking users off the network and replacing IP-based access with logical, per-session based access that enforces least privilege on your enterprise resources.

                                      Netskope ZTNA Next: No apps left behind

                                      Netskope ZTNA Next was built from the ground up and offers a clear path to replace remote access VPNs for all application access use cases by delivering secure, bi-directional connectivity and bringing with it a host of benefits:  

                                      • Modernizes remote connectivity. ZTNA Next provides secure remote access to all types of private applications, including ones that require server-to-client or bi-directional connectivity–a gap for other ZTNA solutions–thereby accelerating adoption of a zero trust architecture.
                                      • Improves overall security posture. ZTNA Next is inherently more secure than VPNs because it provides application access rather than network access. It strictly enforces least-privilege access and adaptively grants the right amount of trust at the right time with the Netskope Zero Trust Engine. The result significantly narrows your attack surface and minimizes the risk of  lateral movement within your network.
                                      • Delivers a great experience for end-users. Ensure reliable and optimized access to critical applications, including time-sensitive voice and video communications used by call centers and help desks, with our innovative endpoint-based software-defined WAN technology built into the Netskope Client. This technology provides Quality of Experience which uses traffic management capabilities and techniques such as forward error correction to mitigate suboptimal network conditions such as packet loss.
                                      • Reduces complexity and inefficiency. Ensure that remote workforces of any size can securely and swiftly connect to enterprise resources without taxing your network or security teams with the operational overhead of installing network appliances or constantly applying patches. Netskope ZTNA Next is cloud-based and software-defined, meaning scaling is easy and patching is automatic.

                                      Not all ZTNAs deliver on true VPN replacement

                                      Despite other ZTNA vendors’ promises of a seamless transition away from VPNs, the reality has proven to be more challenging due to a technical limitation; most ZTNA solutions only support endpoint-initiated traffic flows. For this reason, many organizations are still tethered to their VPNs for critical legacy applications such as remote assistance and VoIP. This creates more than just an operational burden on administrators (managing VPN alongside ZTNA); it also increases costs and complexity while leaving organizations exposed to the security vulnerabilities inherent in their residual VPN appliances. 

                                      Choose a ZTNA solution that does more than just promise; choose one that delivers a future-proof architecture. It should comprehensively address every application you will uncover during your implementation, overcoming the challenges of classic ZTNA architectures that rely solely on an inside-out connectivity model.  

                                      Netskope is here to help

                                      Recognizing the urgency of this situation, Netksope is ready to assist customers in transitioning from Ivanti Connect Secure VPN. We are providing the following bundle:

                                      • 90 day license: Get started quickly with your VPN replacement with Netskope ZTNA Next for 90 days emergency use at no cost and no obligation.
                                      • Free architecture assessment: Architecture and configuration assessment and consultation services.
                                      • Free migration assistance: Access 30 days of free professional services assistance for deployment.

                                      Learn more about replacing Ivanti VPN with ZTNA Next here

                                      author image
                                      Michael Koyfman
                                      Michael Koyfman is the Head of Global Solution Architecture at Netskope. He and his team advise Netskope customers on best practices around Netskope deployments.
                                      Michael Koyfman is the Head of Global Solution Architecture at Netskope. He and his team advise Netskope customers on best practices around Netskope deployments.
                                      author image
                                      Gerry Plaza
                                      Gerry Plaza serves as Field CTO in the Chief Strategy Office. His career trajectory has taken him through every IT functional role of increasing responsibilities.
                                      Gerry Plaza serves as Field CTO in the Chief Strategy Office. His career trajectory has taken him through every IT functional role of increasing responsibilities.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog