ネットスコープは、2022年Gartner®社のセキュリティ・サービス・エッジ(SSE)のマジック・クアドラントでリーダーの1社と位置付けられました。レポートを読む

  • 製品

    Netskope製品は、NetskopeSecurityCloud上に構築されています。

  • プラットフォーム

    世界最大のセキュリティプライベートクラウドでの比類のない可視性とリアルタイムデータおよび脅威保護。

ネットスコープ、2022年Gartner社のセキュリティ・サービス・エッジ(SSE)のマジック・クアドラントでリーダーの1社と位置付けられる

レポートを読む 製品概要に移動
Netskope Gartner マジック・クアドラント 2022 SSEリーダー

Netskope は、データと脅威の保護、および安全なプライベートアクセスを実現するための機能を統合した、最新のクラウドセキュリティスタックを提供します。

プラットフォームを探索する
大都市の俯瞰図
  • 変身

    デジタルトランスフォーメーションを保護します。

  • セキュリティの近代化

    今日と明日のセキュリティの課題に対応します。

  • フレームワーク

    サイバーセキュリティを形作る規制の枠組みを採用する。

  • 業界ソリューション

    Netskopeは、クラウドに安全に移行するためのプロセスを世界最大規模の企業に提供しています。

最小の遅延と高い信頼性を備えた、市場をリードするクラウドセキュリティサービスに移行します。

詳しくはこちら
Lighted highway through mountainside switchbacks

シングルパスSSEフレームワークを使用して、他のセキュリティソリューションを回避することが多い脅威を防止します。

詳しくはこちら
Lighting storm over metropolitan area

SSEおよびSASE展開のためのゼロトラストソリューション

詳しくはこちら
Boat driving through open sea

Netskopeは、クラウドサービス、アプリ、パブリッククラウドインフラストラクチャを採用するための安全でクラウドスマートかつ迅速な旅を可能にします。

詳しくはこちら
Wind turbines along cliffside
  • お客様の成功事例

    デジタルトランスフォーメーションの旅を保護し、クラウド、Web、およびプライベートアプリケーションを最大限に活用します。

  • カスタマーサポート

    Netskope環境を最適化し、成功を加速するためのプロアクティブなサポートとエンゲージメント。

  • トレーニングと認定

    Netskope training will help you become a cloud security expert.

Netskopeを信頼して、進化する脅威、新しいリスク、テクノロジーの変化、組織とネットワークの変更、および新しい規制要件への対応を支援してください。

詳しくはこちら
Woman smiling with glasses looking out window

クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発のさまざまなバックグラウンドを持つ世界中の資格のあるエンジニアが、タイムリーで高品質の技術支援を提供する準備ができています。

詳しくはこちら
Bearded man wearing headset working on computer

Netskopeトレーニングで、デジタルトランスフォーメーションの旅を保護し、クラウド、ウェブ、プライベートアプリケーションを最大限に活用してください。

詳しくはこちら
Group of young professionals working
  • リソース

    クラウドへ安全に移行する上でNetskopeがどのように役立つかについての詳細は、以下をご覧ください。

  • ブログ

    Netskopeがセキュリティサービスエッジ(SSE)を通じてセキュリティとネットワークの変革を可能にする方法を学びましょう。

  • イベント&ワークショップ

    最新のセキュリティトレンドを先取りし、仲間とつながりましょう。

  • 定義されたセキュリティ

    サイバーセキュリティ百科事典で知っておくべきことすべて。

セキュリティビジョナリーポッドキャスト

ボーナスエピソード:セキュリティサービスエッジ(SSE)の重要性

ポッドキャストを再生する
Black man sitting in conference meeting

Netskopeがセキュリティサービスエッジ(SSE)機能を介してゼロトラストおよびSASEジャーニーを実現する方法に関する最新情報をお読みください。

ブログを読む
Sunrise and cloudy sky

SASE Week

Netskope is positioned to help you begin your journey and discover where Security, Networking, and Zero Trust fit in the SASE world.

詳しくはこちら
SASE Week

セキュリティサービスエッジとは何ですか?

SASEのセキュリティ面、ネットワークとクラウドでの保護の未来を探ります。

詳しくはこちら
Four-way roundabout
  • 会社概要

    クラウド、データ、ネットワークセキュリティの課題の先取りをサポート

  • ネットスコープが選ばれる理由

    クラウドの変革とどこからでも機能することで、セキュリティの機能方法が変わりました。

  • リーダーシップ

    ネットスコープの経営陣はお客様を成功に導くために全力を尽くしています。

  • パートナー

    私たちはセキュリティリーダーと提携して、クラウドへの旅を保護します。

Netskopeは仕事の未来を可能にします。

詳しくはこちら
Curvy road through wooded area

Netskopeは、組織がゼロトラストの原則を適用してデータを保護できるように、クラウド、データ、およびネットワークのセキュリティを再定義しています。

詳しくはこちら
Switchback road atop a cliffside

思想家、建築家、夢想家、革新者。 一緒に、私たちはお客様がデータと人々を保護するのを助けるために最先端のクラウドセキュリティソリューションを提供します。

当社のチーム紹介
Group of hikers scaling a snowy mountain

Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。

詳しくはこちら
Group of diverse young professionals smiling
ブログ Full Skope, Security Service Edge Enhancing Security with AI/ML
Aug 25 2022

Enhancing Security with AI/ML

Digital transformation has driven the rapid adoption of cloud-delivered services like SaaS/IaaS/PaaS in enterprises. This, in turn, has resulted in the migration of digital assets (aka data) from the confines of enterprise data centers to the cloud data centers that are not under the control of the enterprises. Additionally, the onset of the COVID-19 pandemic has resulted in remote work becoming the norm. These trends have, in turn, forced a security transformation from the traditional stack of security appliances deployed in an enterprise data center to cloud-delivered security. Gartner has coined the term security service edge (SSE) to represent this new platform where security services like secure web gateway, cloud access security broker, zero trust network access, egress firewall, etc. are delivered in the cloud to safely enable users to perform their work and to reduce the risk of getting compromised and losing data.

There are a few key capabilities that are critical to SSE solutions:

  • Zero Trust Data Access – SSE solutions enforce security policies for accessing data based on contextual information like user, device, application, application risk, user activity, user risk, etc. This contextual information becomes the virtual badge that allows/denies/coaches a user’s access to an enterprise’s digital assets
  • Insider Threat Detection – Enterprise users (employees, contractors) are entrusted with access to business-sensitive data to carry out their work. Security controls are needed to ensure these insiders do not inadvertently or maliciously exfiltrate the sensitive data thereby putting the business at risk.
  • External Threat Detection – Every enterprise is under attack from external bad actors looking to compromise the coveted data for monetary or strategic control purposes. These actors can be individual hackers and organized cybercrime groups, as well as nation-states. The attacks can be phishing, malware, ransomware, or even sophisticated APT attacks. SSE solutions provide effective threat detection, prevention, and remediation services as an added layer of defense to enterprises to protect their data.

The role of AI/ML in SSE solutions

The key underpinning of a powerful SSE solution is the ability to extract very rich contextual information when processing network traffic and enforce the zero trust data access policies. Some of the inputs needed for making the data access decision are the sensitivity of the data leaving an enterprise as well as indicators of threat in data coming from external sources. These are areas where artificial intelligence (AI) and machine learning (ML) have proven to be invaluable in enhancing the fidelity of detections. Let’s look at this in more detail:

Sensitive data classification

Legacy data security solutions use a combination of regular expressions, keywords, and dictionaries to identify sensitive data. This is very error-prone and leads to excessive false positives and in turn, adds a burden to security analysts to sift through mounds of alerts to identify the real violations.

Machine learning-driven data classification can significantly reduce this burden and provide high fidelity classification verdicts. Natural language processing (NLP) algorithms are very conducive to solving this problem. NLP models have been developed by Netskope to classify common business documents like tax forms, paychecks, business contracts, non-disclosure agreements, etc. By using these pre-built models, security admins do not have to create cumbersome and error-prone regular expressions and other patterns to identify which of these types of documents contain sensitive information that needs to be protected from compromise.

In the Netskope Security Cloud, 20% of documents being scanned are images, like JPG and PNG files. Additionally, many business documents have embedded images. The most common way of classifying images is to run them through an optical character recognition (OCR) engine. It is well known that the efficacy of OCR engines is marginal for the commonly seen image content. This is another area where AI/ML can be leveraged to yield outstanding results. There are a number of deep learning algorithms that are suitable for classifying image data. Examples of image detection AI/ML models deployed in the Netskope Security Cloud include passports, drivers’ licenses, other photo identification, computer screenshots, whiteboard images, etc. Given the rise of privacy regulations around the world like CCPA, GDPR, LGPD, etc., it becomes very important for enterprises in possession of images that contain PII data to protect it from being compromised by insiders and external actors.

Threat detection

Insider threat continues to be one of the biggest issues facing enterprises these days. Departing employees tend to take the sensitive information like design documents and code that they contributed to while working in the company. Malicious insiders also steal company data and share it externally. The Netskope Intelligent SSE solution keeps a log of all user activities and applies AI/ML algorithms to detect anomalous behavior. In addition to alerting the admins about the anomalous behavior, the solution also maintains a risk score for every user similar to the credit score that each of us has. The risk score is then fed into the zero trust data access policies as a matching criterion. For example, a user with a poor user risk score can be denied access to sensitive data.

A very common way in which threats like malware and ransomware are detected is using vulnerability and exploit signatures. Indicators of compromise like bad file hashes and malicious URLs are also other techniques used to detect threats. These techniques are good at detecting known vulnerabilities but what about the unknown or what is commonly referred to as zero-day threats. This is where AI/ML comes to the rescue. By training AI/ML models with the vast number of known vulnerabilities and exploits, the trained models are able to detect yet to-be-discovered attacks. Netskope has successfully developed AI/ML models to detect threats in executable files (referred to as PE files) as well as common document formats like PDF and Microsoft Office documents.

In the Netskope Next Gen Secure Web Gateway, AI/ML models are used to classify URLs as well as the web content belonging to phishing sites that tend to steal user credentials. AI/ML is also used to categorize websites and help block inappropriate content from being viewed by enterprise users. 

Conclusion

In this blog, we have seen that AI/ML algorithms can help solve a variety of problems that are commonly seen in enterprises. When it comes to SSE solutions, it has to be noted that these AI/ML algorithms have to be optimized to run and return a verdict in real time to be effective. Over time, there are going to be many more challenging use cases that AI/ML can be used to solve effectively.

author image
About the author
Krishna Narayanaswamy, Netskope's Founder and CTO, is a highly regarded researcher in deep packet inspection, security, and behavioral anomaly detection with over 25 years of industry experience. He leads Netskope's research efforts in data and threat protection and is a frequent presenter on security thought leadership topics in leading conferences. Previously he founded Top Layer Networks and served as a distinguished engineer at Juniper Networks where he delivered successful products to the market. He holds over 50 patents that range from security to accelerated packet processing to data classification.
Krishna Narayanaswamy, Netskope's Founder and CTO, is a highly regarded researcher in deep packet inspection, security, and behavioral anomaly detection with over 25 years of industry experience. He leads Netskope's research efforts in data and threat protection and is a frequent presenter on security thought leadership topics in leading conferences.…