閉める
閉める
明日に向けたネットワーク
明日に向けたネットワーク
サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。
          Netskopeを体験しませんか?
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            Netskope、2024年ガートナー、シングルベンダーSASEのマジック・クアドラントでリーダーの1社の位置付けと評価された理由をご確認ください。
              ダミーのためのジェネレーティブAIの保護
              ダミーのためのジェネレーティブAIの保護
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                最新の情報漏えい対策(DLP)for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  SASEダミーのための最新のSD-WAN ブック
                  Modern SD-WAN for SASE Dummies
                  遊ぶのをやめる ネットワークアーキテクチャに追いつく
                    リスクがどこにあるかを理解する
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                            Netskope GovCloud
                            NetskopeがFedRAMPの高認証を達成
                            政府機関の変革を加速するには、Netskope GovCloud を選択してください。
                              Let's Do Great Things Together
                              Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。
                                Netskopeソリューション
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskopeテクニカルサポート
                                  Netskopeテクニカルサポート
                                  クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発など、多様なバックグラウンドを持つ全世界にいる有資格のサポートエンジニアが、タイムリーで質の高い技術支援を行っています。
                                    Netskopeの動画
                                    Netskopeトレーニング
                                    Netskopeのトレーニングは、クラウドセキュリティのエキスパートになるためのステップアップに活用できます。Netskopeは、お客様のデジタルトランスフォーメーションの取り組みにおける安全確保、そしてクラウド、Web、プライベートアプリケーションを最大限に活用するためのお手伝いをいたします。

                                      Netskope @ RSA Conference 2018 Asia Pacific & Japan

                                      Jul 31 2018
                                      Tags
                                      Cloud Security
                                      Netskope Threat Protection
                                      Netskope Threat Research Labs

                                      The RSA Conference 2018 Asia Pacific & Japan was held in Marina Bay Sands, Singapore from the 25 – 27 July. Several distinguished professionals from around the world attended the event, which included technical trainings, security conference and a capture the flag (CTF) competition.

                                      Abhinav Singh and Ashwin Vamshi from the Netskope Threat Research Labs were privileged to deliver a talk on “Endpoint vs. Cloud: Forensicating Cyberthreats in Two Parallel Worlds!”.

                                      With a major shift of services towards cloud, the dynamics of threats have changed and they have started adapting to this new playground. From a security and threat detection perspective, it becomes crucial to understand how the cloud platforms differ from the traditional client-server models. One of the main agenda of the talk was to compare the endpoint deployment with current cloud infrastructure while performing various security assessments like penetration testing, forensics, and malware analysis. The concept of shared responsibility model in cloud infrastructure opens up new challenges as well as opportunities to tackle some of the most rudimentary challenges of security. A deeper understanding of the model helps in early adoption of right security solutions and practices at an early stage of migration towards cloud.

                                      Another important agenda of the talk was to understand some of the advance intrusion capabilities in the cloud like pivoting inside IaaS, privilege escalations and minimizing traces of activities inside a cloud infrastructure. We provided a list of the cloud attacks that have been detailed in our research blogs

                                      One of the major differences in compromising the cloud infrastructures is to hijack its resources and use them for illegal cybercrime activities like cryptojacking and botnet attacks. The slide image below lists some of the major impacts to cloud infrastructure upon falling victim to such intrusion attempts.

                                      The talk concluded with some key takeaways:

                                      • Comparing the Endpoint security with Cloud security
                                      • Mapping various security aspects like penetration testing, forensics, malware analysis and identity management in the two platforms.
                                      • Understanding intrusion techniques in a cloud infrastructure.
                                      • Understanding key features of cloud platform to build new security solutions.

                                      The last agenda of the talk was to educate the audience in building a cloud security model for the enterprises. We discussed some of our use-cases that helped create the cloud security threat stack at Netskope and how it can be utilized by organizations in securing their SaaS, PaaS or IaaS infrastructures.

                                      Overall, the talk proved its worth in the speaking slots by attracting a near full-house audience and a rich QA session post the talk. Our speakers were delighted with the opportunity to meet and attend talks workshops from speakers all over the world in the cybersecurity arena of RSA Conference 2018 Asia Pacific & Japan.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog