ネットスコープは、2022年Gartner®社のセキュリティ・サービス・エッジ(SSE)のマジック・クアドラントでリーダーの1社と位置付けられました。レポートを読む

  • 製品

    Netskope製品は、NetskopeSecurityCloud上に構築されています。

  • プラットフォーム

    世界最大のセキュリティプライベートクラウドでの比類のない可視性とリアルタイムデータおよび脅威保護。

ネットスコープ、2022年Gartner社のセキュリティ・サービス・エッジ(SSE)のマジック・クアドラントでリーダーの1社と位置付けられる

レポートを読む 製品概要に移動
Netskope Gartner マジック・クアドラント 2022 SSEリーダー

Netskope は、データと脅威の保護、および安全なプライベートアクセスを実現するための機能を統合した、最新のクラウドセキュリティスタックを提供します。

プラットフォームを探索する
大都市の俯瞰図
  • 変身

    デジタルトランスフォーメーションを保護します。

  • セキュリティの近代化

    今日と明日のセキュリティの課題に対応します。

  • フレームワーク

    サイバーセキュリティを形作る規制の枠組みを採用する。

  • 業界ソリューション

    Netskopeは、クラウドに安全に移行するためのプロセスを世界最大規模の企業に提供しています。

最小の遅延と高い信頼性を備えた、市場をリードするクラウドセキュリティサービスに移行します。

詳しくはこちら
Lighted highway through mountainside switchbacks

シングルパスSSEフレームワークを使用して、他のセキュリティソリューションを回避することが多い脅威を防止します。

詳しくはこちら
Lighting storm over metropolitan area

SSEおよびSASE展開のためのゼロトラストソリューション

詳しくはこちら
Boat driving through open sea

Netskopeは、クラウドサービス、アプリ、パブリッククラウドインフラストラクチャを採用するための安全でクラウドスマートかつ迅速な旅を可能にします。

詳しくはこちら
Wind turbines along cliffside
  • お客様の成功事例

    デジタルトランスフォーメーションの旅を保護し、クラウド、Web、およびプライベートアプリケーションを最大限に活用します。

  • カスタマーサポート

    Netskope環境を最適化し、成功を加速するためのプロアクティブなサポートとエンゲージメント。

  • トレーニングと認定

    Netskope training will help you become a cloud security expert.

Netskopeを信頼して、進化する脅威、新しいリスク、テクノロジーの変化、組織とネットワークの変更、および新しい規制要件への対応を支援してください。

詳しくはこちら
Woman smiling with glasses looking out window

クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発のさまざまなバックグラウンドを持つ世界中の資格のあるエンジニアが、タイムリーで高品質の技術支援を提供する準備ができています。

詳しくはこちら
Bearded man wearing headset working on computer

Netskopeトレーニングで、デジタルトランスフォーメーションの旅を保護し、クラウド、ウェブ、プライベートアプリケーションを最大限に活用してください。

詳しくはこちら
Group of young professionals working
  • リソース

    クラウドへ安全に移行する上でNetskopeがどのように役立つかについての詳細は、以下をご覧ください。

  • ブログ

    Netskopeがセキュリティサービスエッジ(SSE)を通じてセキュリティとネットワークの変革を可能にする方法を学びましょう。

  • イベント&ワークショップ

    最新のセキュリティトレンドを先取りし、仲間とつながりましょう。

  • 定義されたセキュリティ

    サイバーセキュリティ百科事典で知っておくべきことすべて。

セキュリティビジョナリーポッドキャスト

ボーナスエピソード:セキュリティサービスエッジ(SSE)の重要性

ポッドキャストを再生する
Black man sitting in conference meeting

Netskopeがセキュリティサービスエッジ(SSE)機能を介してゼロトラストおよびSASEジャーニーを実現する方法に関する最新情報をお読みください。

ブログを読む
Sunrise and cloudy sky

SASE Week

Netskope is positioned to help you begin your journey and discover where Security, Networking, and Zero Trust fit in the SASE world.

詳しくはこちら
SASE Week

セキュリティサービスエッジとは何ですか?

SASEのセキュリティ面、ネットワークとクラウドでの保護の未来を探ります。

詳しくはこちら
Four-way roundabout
  • 会社概要

    クラウド、データ、ネットワークセキュリティの課題の先取りをサポート

  • ネットスコープが選ばれる理由

    クラウドの変革とどこからでも機能することで、セキュリティの機能方法が変わりました。

  • リーダーシップ

    ネットスコープの経営陣はお客様を成功に導くために全力を尽くしています。

  • パートナー

    私たちはセキュリティリーダーと提携して、クラウドへの旅を保護します。

Netskopeは仕事の未来を可能にします。

詳しくはこちら
Curvy road through wooded area

Netskopeは、組織がゼロトラストの原則を適用してデータを保護できるように、クラウド、データ、およびネットワークのセキュリティを再定義しています。

詳しくはこちら
Switchback road atop a cliffside

思想家、建築家、夢想家、革新者。 一緒に、私たちはお客様がデータと人々を保護するのを助けるために最先端のクラウドセキュリティソリューションを提供します。

当社のチーム紹介
Group of hikers scaling a snowy mountain

Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。

詳しくはこちら
Group of diverse young professionals smiling
ブログ Full Skope There’s No Such Thing as “Shadow IT.” It’s Business IT.
Aug 30 2022

There’s No Such Thing as “Shadow IT.” It’s Business IT.

How does an application find its way into a company? In most cases today, people don’t start by searching through their organization’s catalog of approved applications. 

This may be disappointing news to all the CIOs who take the time to build elegant catalogs to help their employees find all of the licensed, approved, and supported applications in one place. But the fact is, when someone in a given role at a company needs a new application to perform their job, they most likely start by typing their problem into the Google search bar. Within minutes they can compare products, make a decision, and sign up for the solution that best meets their business needs. The proliferation of software-as-a-service (SaaS) has made this self-service support model incredibly easy. Cloud software spending grew 23% in 2021 and SaaS spending is projected to grow another 40% over the next two years.

While there are clear advantages in terms of business enablement, there are also risks attached to this kind of behavior. This is why the term “shadow IT” emerged as a catch-all for unvetted and potentially insecure technologies that enter a company without the blessing of IT and/or security teams. Potential security risks have shown measurable consequences. Three out of four security leaders report increased attacks since the start of the COVID-19 pandemic—with increased use of shadow IT applications by remote workers linked as a key contributing factor.

For technology leaders, the conversation around shadow IT has invariably been about how we need to control the problem. But I was recently talking about this issue with another CIO. Recalling a conversation with his CEO, he said, “We need to stop calling it shadow IT. It’s business IT—learn to support it, not control it.” 

He’s not the only one who feels this way. The vast majority (97%) of IT professionals report that their employees are more productive when allowed to use their preferred technologies. The question for security and IT leaders then becomes, how can they embrace so-called shadow IT in the full light of day without putting their organizations at risk? First, let’s take a closer look at how shadow IT gets into an organization:

How does shadow IT make its way into an organization?

To the chagrin of IT leaders, when someone needs a solution to a problem, instead of asking IT or using an corporate application catalog, they run a search on Google and refine their query until they find software applications that fit their intended use case instead of looking through the organization’s existing app catalog. They’ll pick the one that looks the best from what they can find online and then sign up for a free trial to test it out. Maybe they’ll ask their peers if anyone else is using this new application. If they like the results, maybe they even start sharing it with others in their business unit. Over time, the application generates a groundswell of support within the organization.

Eventually, the new application makes its way to an IT Business Partner.  And the business unit tells IT that they want to move forward with this new application in their department. “We’d like to buy this application for our team. Can you support this?” There are three possible outcomes at this point…

  1. IT says, “Oh yeah, we already have licenses for that and we’d love to get you set up.” And we absolutely would support you because the biggest challenge we have in technology isn’t building things, it’s getting people to use them. Adoption is always the problem—so this solves your adoption problems. This is the Nirvana outcome. 
  2. The business unit finds a tool that solves a problem that hasn’t been solved yet. That’s an opportunity to learn and ask questions: “What problem are you trying to solve? Let me understand it better because it could be a problem that other people in the company also have.” Maybe this tool could become reusable or re-deployable across multiple business units. It presents an opportunity.
  3. IT already has a solution for that specific business problem—but it’s not the tool the business unit wants. So now it becomes about who has the better solution—and often there’s emotional attachment to contend with. If the business unit has fallen in love with the tool they found and tested, that can lead to conflict. This is the worst outcome.

The last thing you want is to run into that third scenario, and the best way to avoid that is to be proactive early on in the process. This way, the apps in use at least have the proper controls around them so IT has proper visibility. That said, there are also options to better coach the business unit to utilize available tools. 

How can you solve for these issues Internally?

One way you can solve this issue is by encouraging people to use the tools you already have through coaching. If we already know users are turning to Google first before the app catalog, we can coach them to utilize the tools we already have at our disposal to help with whatever business issue they’re trying to solve before spooling up a new one. 

This is a way that we enable shadow IT as business IT here at Netskope. Using the rich visibility and policy controls we get from Netskope Intelligent Security Service Edge (SSE) capabilities, we have the ability to coach users with a nudge in the right direction.

For example, say you already have a bulk licensing agreement with LucidChart. If someone from our organization tries to sign up for their own instance of LucidChart, we can prompt them with a message letting them know that we already have licenses available, with instructions for how to request a license through our service desk.

This is beneficial for a couple of reasons: First, this helps keeps users operating within managed instances of apps where security teams have visibility and control over the data being created within. If someone spooled up a personal instance of an app, and later leaves the company, all of that data is going with them. This way IT teams have visibility to keep that data under control. Second, from a cost perspective, taking advantage of existing licenses instead of expensing additional new ones saves the organization from paying twice.

Being able to guide users to better utilize the tools already at their disposal is a key way to solve for a deluge of new apps entering your organization, and better support shadow IT as business IT.

Moving business applications out of the shadows

The strategy of trying to block or control shadow IT applications wasn’t working—even without factoring in the ongoing cybersecurity skills shortage and The Great Resignation’s impact on IT departments. While more efforts can be made to help employees take advantage of approved applications and existing software licenses with your organization, many employees will still want to choose their own toolsets based on past experience, independent research, or word-of-mouth among peers. This means finding better ways to drive proactive conversations early between the business unit and IT teams so visibility is built in from the beginning to make sure business IT is governed and supported correctly. 

While we primarily focused on applications in this blog, in my next blog, I will look at how the same issues are springing up in public cloud governance and how SSE capabilities can help.

Additionally, if you’d like to hear from me about how SASE can help unleash your hybrid workforce, register for my SASE Week session with retired Global CIO of Bayer Daniel Hartert on September 15.

author image
About the author
Mike Anderson brings over 20 years of experience to his role as Chief Digital and Information Officer for Netskope, having built and led high-performing teams across a wide range of disciplines, including sales, operations, business development, and information technology.
Mike Anderson brings over 20 years of experience to his role as Chief Digital and Information Officer for Netskope, having built and led high-performing teams across a wide range of disciplines, including sales, operations, business development, and information technology.