Netskope Threat Protection

Decodes and inspects traffic that other security solutions cannot, such as unmanaged cloud services, sync clients, mobile apps, and TLS-encrypted cloud services and websites, to identify and address threats.

Threat protection like no other

Netskope is the only unified cloud access security broker (CASB) and next generation secure web gateway (SWG) that combines a unique cloud-native vantage point, multiple layers of threat detection, and remediation capabilities to deliver comprehensive threat protection for cloud and web services.

Cloud and Threat Report: July 2021 Edition

Hey, You, Get Out of my Cloud

 

Data risks and emerging threats are in the spotlight in the July 2021 edition of the Cloud and Threat Report. The continued growth of malware delivered by cloud applications and the potential for critical data exfiltration tied to employees departing their jobs are among increasing cloud application security risks.

 

Netskope Threat Labs dives into these trends in the latest installment of the semi-annual Cloud and Threat Report.

Cloud and Threat Report: July 2021 Edition

The Netskope
Security Cloud

See our platform →
The Netskope Security Cloud

Unrivaled visibility. Real-time data and threat protection.

The Netskope Security Cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.

The Netskope Security Cloud

Cloud-focused threat protection use cases

01

Malware prevention

Inspect your managed cloud services, such as Office 365 and Box, and inline cloud and website traffic for malware. Stop its spread by quarantining and replacing suspicious files with inert tombstone files, or blocking inline downloads.

02

Advanced threat protection

Ensure defenses match your needs, with prevention, detection, and advanced AI/ML-based threat analysis options and integration with your existing security infrastructure.

03

Detect behavior anomalies

Take advantage of user and entity behavior analytics (UEBA) to baseline activities and detect anomalies, in real time. Also, detect unusual and excessive data movement, insider threats, or compromised credentials.

04

Prevent cloud phishing

Reduce the attack surface created by the managed cloud services your users trust and attackers target. Detect credential inputs into cloud-hosted fake phishing forms legacy defenses miss.

05

 Hosting Payloads

Legacy defenses with allow/deny controls open the door for cloud hosted payloads in apps and cloud services as they rarely deny them, cannot inspect the content, and users trust these domains with valid certificates. Netskope inspects cloud and web traffic for threats, plus applies granular policy controls based on data context.

06

Malicious Documents

Since the pandemic, malicious Office documents have increased targeting remote working users and evading legacy defenses. Netskope inspects cloud and web traffic for malicious Office documents using a supervised machine-learning classifier trained and kept current with production data.

Attacks are evading legacy web and email defenses

Rogue accounts

Attackers use rogue account instances within trusted managed cloud services and apps to share and deliver malicious payloads. Legacy defenses typically don’t know account owners, but Netskope Cloud XDTM understands the user, app, instance, risk, data, and activity, so it can block rogue instances and prevent this attack vector.

Tailored attacks

Attackers conduct reconnaissance to identify your company’s preferred cloud services and apps and then creates fake login screens for these services to entice users to access, expose credentials, and possibly download payloads. Netskope Cloud XD analyzes cloud service hosting accounts, so it can identify and block fake login pages.

Cloud phishing

Attacker evades legacy web and email defenses by delivering phishing attack elements from trusted managed cloud services using a rogue account instance. Netskope understands the difference between company and rogue instances for your managed cloud services, such as AWS, Azure, GitHub, Box, or Drive to block cloud phishing.

Hosting payloads

Legacy inline defenses often deploy ‘allow policies’ for all the services adopted by different lines of business, departments, and users. This opens the door to attack payloads being hosted in the cloud. Netskope can apply granular policies to both your managed and unmanaged clouds, to determine company approved account instances.

Cloud-based C2

Attackers use the cloud for command-n-control (C2) communications. Recently, an attacker used Slack for C2, knowing the company allowed it through legacy defenses. Instead of a broad ‘allow all’ for cloud services and apps, Netskope enables you to enforce granular user and account instance-aware policies to pinpoint and mitigate risks.

The Netskope ZTNA (zero trust network access) cloud-native solution provides secure access to applications in hybrid IT environments while reducing the “appliance sprawl” of legacy point-to-point access solutions like VPNs.

Data exfiltration

Unprotected cloud storage that leads to data exposure is well known, however, data can also be exfiltrated through rogue accounts in managed cloud services. Netskope provides Data Loss Prevention (DLP) defenses and granular policy controls that are aware of user, app, instance, risk, data and activity to prevent data loss.

Rogue accounts

Attackers use rogue account instances within trusted managed cloud services and apps to share and deliver malicious payloads. Legacy defenses typically don’t know account owners, but Netskope Cloud XDTM understands the user, app, instance, risk, data, and activity, so it can block rogue instances and prevent this attack vector.

Tailored attacks

Attackers conduct reconnaissance to identify your company’s preferred cloud services and apps and then creates fake login screens for these services to entice users to access, expose credentials, and possibly download payloads. Netskope Cloud XD analyzes cloud service hosting accounts, so it can identify and block fake login pages.

Cloud phishing

Attacker evades legacy web and email defenses by delivering phishing attack elements from trusted managed cloud services using a rogue account instance. Netskope understands the difference between company and rogue instances for your managed cloud services, such as AWS, Azure, GitHub, Box, or Drive to block cloud phishing.

Hosting payloads

Legacy inline defenses often deploy ‘allow policies’ for all the services adopted by different lines of business, departments, and users. This opens the door to attack payloads being hosted in the cloud. Netskope can apply granular policies to both your managed and unmanaged clouds, to determine company approved account instances.

Cloud-based C2

Attackers use the cloud for command-n-control (C2) communications. Recently, an attacker used Slack for C2, knowing the company allowed it through legacy defenses. Instead of a broad ‘allow all’ for cloud services and apps, Netskope enables you to enforce granular user and account instance-aware policies to pinpoint and mitigate risks.

Data exfiltration

Unprotected cloud storage that leads to data exposure is well known, however, data can also be exfiltrated through rogue accounts in managed cloud services. Netskope provides Data Loss Prevention (DLP) defenses and granular policy controls that are aware of user, app, instance, risk, data and activity to prevent data loss.

Key features and benefits

Gain full visibility

See what’s going on with inline encrypted traffic en route to and from cloud services and websites, as well as all your files stored in managed cloud services to prevent known threats and detect the unknown.

Read more
Netskope advanced data loss protection (DLP)

Prevent threats and data exfiltration

Leverage multiple prevention defense layers, threat intelligence feeds, automated IOC sharing, UEBA anomaly detection including data exfiltration, remote browser isolation, plus granular policy controls using data context.

Read more

Detect and hunt threats

Use multiple detection defenses, including machine learning anomaly detection and sandboxing, to uncover unknown threats, plus leverage 90 days of rich metadata for investigations and threat hunting.

Read more

Leverage cloud threat intelligence

Benefit from the insights of Netskope Threat Research Labs, which is dedicated to the discovery and analysis of new cloud threats, alongside 40+ shared threat intelligence sources, for up-to-the-minute protection against the threats you are facing.

Read more

Quickly respond to threats

Block or quarantine attacks before they can do any damage and take advantage of automated workflows to further analyze and reverse the effects of known threats. Plus, integrate and share threat intelligence and incident details with other security solutions in your infrastructure to coordinate responses.

Read more

It’s a cloud and mobile usage world today and if you’re not thinking about that from a threat propagation point of view, you’re flying blind. At the core of our CASB project was solving this side of the cloud enablement equation and Netskope gives us that power.

—CISO, Leading High Tech Company

Trusted by leading companies

Apria Healthcare
Ather
AVX
CSA Group
Evalueserve
Stroock

Resources

Netskope Cloud Threat Exchange

Netskope Cloud Threat Exchange

Netskope Advanced Analytics

Netskope Advanced Analytics

Netskope Remote Browser Isolation

Netskope Remote Browser Isolation

Adoption Guide for SASE

Adoption Guide for SASE

Cybersecurity Insiders - 2020 Zero Trust Report

Cybersecurity Insiders - 2020 Zero Trust Report

Netskope Threat Protection - data sheet

Netskope Threat Protection

Demo - Netskope and CrowdStrike

Demo - Netskope and CrowdStrike

Cloud and Threat Report - February 2020 Edition

Cloud and Threat Report - February 2020 Edition

Shift your threat prevention to the cloud, for the cloud

61%

of malware is cloud delivered

Source: Netskope Cloud and Threat Report, 2021

27%

of malware is malicious documents

Source: Netskope Cloud and Threat Report, 2021

Accelerate your security program with the SASE leader.