閉める
閉める
明日に向けたネットワーク
明日に向けたネットワーク
サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。
          Netskopeを体験しませんか?
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            Netskope、2024年ガートナー、シングルベンダーSASEのマジック・クアドラントでリーダーの1社の位置付けと評価された理由をご確認ください。
              ダミーのためのジェネレーティブAIの保護
              ダミーのためのジェネレーティブAIの保護
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                最新の情報漏えい対策(DLP)for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  SASEダミーのための最新のSD-WAN ブック
                  Modern SD-WAN for SASE Dummies
                  遊ぶのをやめる ネットワークアーキテクチャに追いつく
                    リスクがどこにあるかを理解する
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                            Netskope GovCloud
                            NetskopeがFedRAMPの高認証を達成
                            政府機関の変革を加速するには、Netskope GovCloud を選択してください。
                              Let's Do Great Things Together
                              Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。
                                Netskopeソリューション
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskopeテクニカルサポート
                                  Netskopeテクニカルサポート
                                  クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発など、多様なバックグラウンドを持つ全世界にいる有資格のサポートエンジニアが、タイムリーで質の高い技術支援を行っています。
                                    Netskopeの動画
                                    Netskopeトレーニング
                                    Netskopeのトレーニングは、クラウドセキュリティのエキスパートになるためのステップアップに活用できます。Netskopeは、お客様のデジタルトランスフォーメーションの取り組みにおける安全確保、そしてクラウド、Web、プライベートアプリケーションを最大限に活用するためのお手伝いをいたします。

                                      The New UK Telecommunications Security Act: What It Means For You

                                      Apr 18 2023

                                      Back in November 2020, the UK Telecommunications (Security) Act started its journey through the Houses of Parliament, and after many readings and much consultation it finally went live almost two years later on the 1st October 2022. At the heart of the Act was a desire to improve the security posture of the UK’s telecoms networks, infrastructure, and organisations, recognising the importance of telecommunications as part of the UK’s critical national infrastructure (CNI). 

                                      The Act followed the “Telecoms Supply Chain Review” which criticised the lack of incentive for telcos to follow best security practices. It provides all the incentive needed by imposing new legal requirements on telecoms firms, handing enhanced regulatory powers to the regulator OFCOM. It also enabled the Secretary of State to introduce a Code of Practice, which outlines the technical requirements with which telecoms operators need to comply. 

                                      It is worth noting that the Act segregates the organisations that are covered into three tiers, judged principally by their annual turnover as an indicator for the impact that any downtime they may experience would have on the UK’s ability to continue to operate business as usual. Tier one are companies with a turnover of more than £1bn, tier two have turnovers above £50m, and tier three have turnovers of less than £50m. 

                                      While the Act is now operational, it includes time for organisations to make the necessary changes for compliance. Tier one companies have just under a year (until 31 March 2024) to implement the “most straightforward and least resource intensive measures,” and an extra year (31 March 2025) to implement the more complex parts of the requirements. For tier two operators, they get an extra two years on each of these days. Tier three have no specific deadline, but are instead “strongly encouraged” to “take appropriate and proportionate measures” and to use the code of practice as a guide. 

                                      With the focus on incentivising best practice, of course there are fines for non-compliance—up to 10% of a company’s annual turnover plus up to £100,000 a day for ongoing contravention. 

                                      Let’s recap what is covered in the Act.  

                                      1. The act is looking to the securing of data processed by the telco’s networks and services, including securing the functions that operate and manage the data
                                      2. Operators must protect the software and equipment that monitors and analyses networks and services
                                      3. Telcos are expected to have (and be able to demonstrate) a deep understanding of the risks they face, as well as the specific ability to identify anomalous activity. They have a specific requirement to communicate and report on these risks and incidents to the relevant internal boards
                                      4. Finally, and perhaps most challenging for some, operators are required to step up their supply chain risk management. This includes demonstrating a clear awareness of ownership and responsibility across the supply chain – understanding and controlling access 

                                      We are having conversations with a number of our customers (and prospects) around the UK Telecommunications Security Act, with a specific focus on how we can assist providers in identifying their externally-facing systems, if sensitive data is exposed, securing specific protocols, and identifying new risks from their supply chain. Much of the discussion relates to the point at which robust security around core network infrastructure interfaces with day-to-day productivity tools that may not be so well protected. For this reason we are seeing interest in both CASB cloud application visibility and security, and broader zero trust network access (ZTNA) tools. 

                                      What do you need to know about us?

                                      • Netskope identifies and protects sensitive data stored in cloud services using predefined and custom compliance templates and language-independent data identifiers to inspect multiple file types.
                                      • The platform provides granular control, ensures compliance, protects against threats, and applies contextual policies for managed and unmanaged devices accessing the web, SaaS applications, and cloud services.
                                      • Netskope offers advanced threat protection capabilities, including multi-layer threat detection and machine learning anomaly detection, to uncover and stop advanced attacks.
                                      author image
                                      Neil Thacker
                                      Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union GDPR.
                                      Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union GDPR.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog