閉める
閉める
明日に向けたネットワーク
明日に向けたネットワーク
サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。
          Netskopeを体験しませんか?
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            Netskope、2024年Gartner®社のシングルベンダーSASEのマジック・クアドラントでリーダーの1社の位置付けと評価された理由をご確認ください。
              ダミーのためのジェネレーティブAIの保護
              ダミーのためのジェネレーティブAIの保護
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                最新の情報漏えい対策(DLP)for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  SASEダミーのための最新のSD-WAN ブック
                  Modern SD-WAN for SASE Dummies
                  遊ぶのをやめる ネットワークアーキテクチャに追いつく
                    リスクがどこにあるかを理解する
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        レガシーVPNを完全に置き換えるための6つの最も説得力のあるユースケース
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                          Colgate-Palmoliveは、スマートで適応性のあるデータ保護により「知的財産」を保護します
                            Netskope GovCloud
                            NetskopeがFedRAMPの高認証を達成
                            政府機関の変革を加速するには、Netskope GovCloud を選択してください。
                              Let's Do Great Things Together
                              Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。
                                Netskopeソリューション
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskopeテクニカルサポート
                                  Netskopeテクニカルサポート
                                  クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発など、多様なバックグラウンドを持つ全世界にいる有資格のサポートエンジニアが、タイムリーで質の高い技術支援を行っています。
                                    Netskopeの動画
                                    Netskopeトレーニング
                                    Netskopeのトレーニングは、クラウドセキュリティのエキスパートになるためのステップアップに活用できます。Netskopeは、お客様のデジタルトランスフォーメーションの取り組みにおける安全確保、そしてクラウド、Web、プライベートアプリケーションを最大限に活用するためのお手伝いをいたします。
                                      プレスリリース

                                      Netskope Report Reveals High Frequency of Compromised Credentials in Enterprise Cloud Apps

                                      • 15 percent of corporate users have had their credentials compromised
                                      • A quarter of all files in cloud storage apps are shared with one or more people outside of the organization
                                      • Organizations have 613 cloud apps in use on average, more than 88 percent of which are not enterprise-ready
                                      • More than 20 percent of organizations have more than 1,000 cloud apps in use

                                      LOS ALTOS, Calif. – Jan. 8, 2015 – Netskope, the leader in safe cloud enablement, today released the January 2015 Netskope Cloud Report™ that monitors enterprise cloud app usage and trends. The report shows a continued increase in cloud app usage across enterprises, as well as the high volume at which files are being shared outside of a given organization. Most notably, the report finds that as many as 15 percent of business users have had their credentials compromised. Since up to half of users re-use passwords for multiple accounts, the likelihood of users logging into business-critical apps with these credentials is high, putting business-sensitive data at risk.

                                      Enterprises are continuing to adopt cloud apps at a fast pace, with an average of 613 cloud apps per organization in Q4, up from 579 the previous quarter. Based on aggregated, anonymized data from the Netskope Active Platform, which provides discovery, deep visibility, and granular control over any cloud app, the report’s findings are based on tens of billions of cloud app events seen across millions of users between October and December 2014. 88 percent of apps in use are not enterprise ready, scoring a “medium” or below in the Netskope Cloud Confidence Index[1] (CCI). Additionally, the report found more than 20 percent of organizations in the Netskope cloud actively use more than 1,000 cloud apps, and eight percent of files in corporate-sanctioned cloud storage apps are in violation of data leak prevention (DLP) policies, including PHI, PCI, PII, source code, and other policies covering confidential or sensitive data.

                                      “2014 left an indelible mark on security — between ongoing high-profile breaches and the onslaught of vulnerabilities like Shellshock and Heartbleed, CSOs and CISOs had more on their plate than ever,” said Sanjay Beri, CEO and founder, Netskope. “These events underscore the sobering reality that many in the workforce have been impacted by data breaches and will subsequently use compromised accounts in their work lives, putting sensitive information at risk. Employees today have shifted from thinking of apps as a nice-to-have to a must-have, and CISOs must continue to adapt to that trend to secure their sensitive corporate and customer data across all cloud apps, including those unsanctioned by IT.”

                                      Growth of Compromised Accounts

                                      This quarter, the Cloud Report is augmented by analysis of compromised accounts. Due to a significant increase in data breaches and leaks from a host of major corporations, websites, and cloud apps, a growing number of users log into business apps using compromised credentials that have been stolen as part of a data hack or exposure. As many as 15 percent of users have had their credentials compromised in a prior data exposure, and many of those users re-use passwords even to log into apps that contain business-sensitive information.

                                      Top 10 Categories of Cloud Apps in the Enterprise

                                      Consumer, prosumer apps and line-of-business apps are all used heavily in enterprises, and the vast majority of apps in each of these categories are not enterprise-ready. Marketing, Finance/Accounting and Human Resources were the categories with the highest number of non-enterprise ready cloud apps – those rating at a “medium” or below in the CCI.

                                      CategoryNumber per EnterprisePercent Not Enterprise-Ready
                                      1Marketing6796%
                                      2Collaboration4384%
                                      3Human Resources3893%
                                      4Productivity3689%
                                      5Finance/Accounting3195%
                                      6Cloud Storage2872%
                                      7CRM/SFA2592%
                                      8Software Development2587%
                                      9Social1876%
                                      10IT/Application Management1673%

                                      Top-Used Apps in Business

                                      The top 20 apps used by enterprises, based on distinct app sessions, reflects all cloud app access points tracked by the Netskope Active Platform, which includes perimeter device (e.g., firewalls, gateways, etc.) log analysis and real-time visibility of campus PC, remote PC, and mobile device (e.g., smartphones, tablets). Cloud Storage and Social categories dominate, as Enterprise File Sync and Share (EFSS) vendors vie for market share.

                                      Cloud AppCategory
                                      1Google DriveStorage
                                      2FacebookSocial
                                      3YouTubeConsumer
                                      4TwitterSocial
                                      5Google GmailWebmail
                                      6iCloudStorage
                                      7DropboxStorage
                                      8LinkedInSocial
                                      9Microsoft OneDriveStorage
                                      10BoxStorage & Collaboration
                                      11Salesforce.comCRM/SFA
                                      12WebExCollaboration
                                      13EvernoteProductivity
                                      14Microsoft Office 365Collaboration
                                      15PinterestConsumer
                                      16LivePersonCall Center
                                      17HubSpotMarketing
                                      18Amazon CloudDriveStorage
                                      19YammerSocial
                                      20ConcurFinance/Accounting

                                      Top Policy Violations and the Rise of DLP

                                      Based on a normalized set of apps, categories, and activities, the five cloud app categories with the highest volume of policy violations[2] include Cloud Storage, Webmail, CRM and SFA, Social, and Collaboration. DLP policy violations involving the upload of data outnumber violations involving the download of data by nearly three to one, while eight percent of content files contain DLP violations, irrespective of when content was uploaded. Twenty five percent of all files are shared with one or more people outside of the organization; 40 percent are shared within the organization and 35 percent are private. Of external users who have links to content, nearly 12 percent have access to 100 files or more.

                                      Violation
                                      Download
                                      Upload
                                      Login
                                      View
                                      Share
                                      Delete
                                      Edit
                                      Login Attempt
                                      Create
                                      Login Failed

                                      Netskope Resources

                                      About Netskope

                                      Netskope™ is the leader in safe cloud enablement. Only the Netskope Active PlatformTM provides discovery, deep visibility, and granular control of sanctioned and unsanctioned cloud apps. With Netskope, IT can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, businesses can move fast, with confidence. Serving a broad customer base including leading healthcare, financial services, high technology, and retail enterprises, Netskope has been named to CIO Magazine’s top 10 cloud security startups and featured in such business media as CBS News, Wall Street Journal, and Forbes. Netskope is headquartered in Los Altos, California. Visit us at www.netskope.com and follow us on Twitter @Netskope.

                                      ###

                                      [1] The Netskope Cloud Confidence Index™ is a database of more than 5,000 cloud apps that are evaluated on 40+objective enterprise-readiness criteria adapted from the Cloud Security Alliance, including security, auditability, and business continuity. The results of the evaluation are normalized to a 0−100 score and mapped to five levels ranging from “poor” to “excellent.”

                                      [2] Volume of policy violations is measured as number of times a defined policy or set of policies are triggered by that combination of parameters being met.