Netskope
Cloud Threat Exchange

Organizations need timely threat intelligence to quickly protect a community across all defense layers.

61%

of malware is cloud delivered

Source: Netskope Cloud and Threat Report, 2021

27%

of malware is malicious Office documents

Source: Netskope Cloud and Threat Report, 2021

Cloud and Threat Report: February 2021 Edition

Cloudy with a chance of malice

 

The February 2021 Edition of the Cloud and Threat Report signals a cyclone forecast of more cloud enabled threats. Key findings show that the majority of all malware is now delivered via cloud applications, underscoring how attackers increasingly abuse popular cloud services to evade legacy security defenses putting enterprise data increasingly at risk.

 

Understand the details why content and context for cloud and web traffic is required for threat and data protection.

Cloud and Threat Report - February 2021

Netskope Cloud
Threat Exchange

Netskope Cloud Threat Exchange (CTE) is a near real-time threat ingestion, curation, and sharing tool that enables Netskope customers and technology partners to bi-directionally exchange IOCs. Security teams can integrate up to the minute intelligence feeds that contain malicious URLs and file hashes into their security infrastructure products such as endpoints, firewalls, secure web-gateways, and cloud access security brokers. For workflow and playbook automation, CTE can also integrate with IR, SIEM, SOAR, MDR, or custom API-based tools.

Netskope
セキュリティクラウド

プラットフォームを見る→
Netskope                      
Security Cloud

比類のない可視性。リアルタイムのデータと脅威からの保護。

Netskopeセキュリティクラウドは、あらゆる場所のあらゆるデバイスからクラウドサービス、ウェブサイト、プライベートアプリにアクセスする際でも、比類なき可視性とリアルタイムデータ、脅威防御を提供します。Netskopeだけがクラウドを理解し、セキュリティチームがデジタルトランスフォーメーションをする際にセキュリティを確保するために必要な保護と速度を、適切なバランスで実現する「データ中心(Data Centric)」のアプローチを採用しています。

Netskope                      
Security Cloud

Key benefits of Cloud Threat Exchange

Automate threat updates

Leverage CTE to automate threat intelligence feeds and sharing with Netskope NG SWG, Threat Protection and third party security defenses.

""

Increase threat coverage

Combine various sources of threat intelligence to improve coverage in different focus areas, such as cloud phishing, web drive-by downloads, or command and control.

Improve threat optics

Understand the frequency an IOC has been detected across different points of the attack surface. Netskope analyzes data-in-motion and at-rest using IOCs for threat detection.

Take quick action

Use CTE to IR workflows or orchestration playbooks to automate response steps, making security analysts more efficient across multiple security tools.

Leverage CTE to automate threat intelligence feeds and sharing with Netskope NG SWG, Threat Protection and third party security defenses.

×

Combine various sources of threat intelligence to improve coverage in different focus areas, such as cloud phishing, web drive-by downloads, or command and control.

×

Understand the frequency an IOC has been detected across different points of the attack surface. Netskope analyzes data-in-motion and at-rest using IOCs for threat detection.

×

Use CTE to IR workflows or orchestration playbooks to automate response steps, making security analysts more efficient across multiple security tools.

×

Cloud Threat Exchange
use cases

01

Integrate third party feeds with Netskope

Use Cloud Threat Exchange to build custom URL lists within the Netskope Next Gen Secure Web Gateway in order to automate management of allow and blocked domains.

02

Increase data protection coverage

Share filehashes of policy violations from on-premise, endpoint, or email based data leakage prevention solutions for additional DLP identification triggers inside Netskope.

03

Consistently manage threat feeds

Use your preferred threat management system or apply your custom scripts to automate curation and enriching shared IoCs with contextually relevant information.

それは今日のクラウドとモバイルを利用する世界であり、脅威の伝播の観点からそれについて考えていなければ、ブラインド・スポットを増やすことになります。CASBプロジェクトの中心は、クラウド使用に取り組む際のこの側面を解決することでしたが、Netskopeはその力を提供します。

—CISO 、大手ハイテク企業

Cloud Threat Exchange partners

リソース

境界線を再構築しましょう