閉める
閉める
明日に向けたネットワーク
明日に向けたネットワーク
サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。
          Netskopeを体験しませんか?
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            Netskope、2024年ガートナー、シングルベンダーSASEのマジック・クアドラントでリーダーの1社の位置付けと評価された理由をご確認ください。
              ダミーのためのジェネレーティブAIの保護
              ダミーのためのジェネレーティブAIの保護
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                最新の情報漏えい対策(DLP)for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  SASEダミーのための最新のSD-WAN ブック
                  Modern SD-WAN for SASE Dummies
                  遊ぶのをやめる ネットワークアーキテクチャに追いつく
                    リスクがどこにあるかを理解する
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                            Netskope GovCloud
                            NetskopeがFedRAMPの高認証を達成
                            政府機関の変革を加速するには、Netskope GovCloud を選択してください。
                              Let's Do Great Things Together
                              Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。
                                Netskopeソリューション
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskopeテクニカルサポート
                                  Netskopeテクニカルサポート
                                  クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発など、多様なバックグラウンドを持つ全世界にいる有資格のサポートエンジニアが、タイムリーで質の高い技術支援を行っています。
                                    Netskopeの動画
                                    Netskopeトレーニング
                                    Netskopeのトレーニングは、クラウドセキュリティのエキスパートになるためのステップアップに活用できます。Netskopeは、お客様のデジタルトランスフォーメーションの取り組みにおける安全確保、そしてクラウド、Web、プライベートアプリケーションを最大限に活用するためのお手伝いをいたします。

                                      When Your Auditors Ask About Cloud: 5 Answers You Need to Have in Your Back Pocket

                                      Jan 21 2016
                                      Tags
                                      Cloud Best Practices
                                      Cloud Security
                                      Tools and Tips
                                      Word on the Street

                                      When it comes to auditors and your organization’s use of cloud services, there is no “if,” only “when.” If you have not explored what cloud services your people are using, or where your business data are kept in the cloud, you will lose points on your next audit. Or you may fail.

                                      Two years ago when we launched Netskope, CIOs told us “We’re not in the cloud,” and auditors told us “The cloud is not part of our audit.” Today, one-third of our business pipeline is made up of inbound requests and there is a steady stream of cloud access security broker (CASB)-specific RFPs. Many of those are driven by failed (or near-failed) security audits.

                                      What are auditors asking about your cloud security regimen? In other words, what answers do you need to have in your back pocket? Here are five.

                                      1. Do you maintain an inventory of cloud services? Where is it and how often is it updated? The average number is 755 per enterprise at last count, and only about one-tenth are known to IT. Getting (and maintaining) this list is critical and foundational to anything else you do.
                                      2. Do you have a cloud service vendor assurance process that includes criteria like data center and software certifications as well as inherent audit capabilities, authentication support, and cloud data security? Does the entire organization adhere to it? Clearly articulating what you will and won’t accept in your organization, and further specifying what compensating controls need to be in place when a cloud service falls short, will go a long way. Besides articulating your process and criteria, think about how you will demonstrate enterprise-wide adherence, what your process is for violators, and how you will show that process to your auditor. Comprehensive monitoring, process enforcement, and automated user coaching can all be useful tacks here.
                                      3. Do your periodic technology risk assessments include cloud services? You should modify it to the idiosyncrasies of the cloud and perform it for cloud services just as regularly. You will be ahead of the game if you do this.
                                      4. Do you have defined access controls for services that contain sensitive or regulated data? Some of your cloud services contain data that can only be accessed by a handful of authorized individuals. Proving that, and reporting on incidents and your response will be as critical for the cloud as it is for on-premises systems. Think about what this means for cloud-based financial apps beholden to Sarbanes-Oxley, HR apps containing personally-identifiable information, and file-sharing apps containing M&A priorities.
                                      5. Do you monitor user activity in cloud services that contain sensitive or regulated data? Just as important as monitoring and reporting on unauthorized access is keeping an audit trail of user activities like “share,” “edit,” “download,” and “delete” in cloud services. This way you can deterministically say whether an individual has stolen or exposed data, and report on the incident and your response in a thorough manner.  

                                      We’ve now seen this movie enough times that we can say audits that involve cloud are no longer a question of “if” than “when.” Want to have the right answers in your back pocket when the time comes? Consider these five questions your cheat sheet.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog