A Netskope foi reconhecida como líder novamente no Quadrante Mágico do Gartner®™ para plataformas SASE. Obtenha o relatório

fechar
fechar
Sua Rede do Amanhã
Sua Rede do Amanhã
Planeje seu caminho rumo a uma rede mais rápida, segura e resiliente projetada para os aplicativos e usuários aos quais você oferece suporte.
          Experimente a Netskope
          Coloque a mão na massa com a plataforma Netskope
          Esta é a sua chance de experimentar a plataforma de nuvem única do Netskope One em primeira mão. Inscreva-se em laboratórios práticos e individualizados, junte-se a nós para demonstrações mensais de produtos ao vivo, faça um test drive gratuito do Netskope Private Access ou participe de workshops ao vivo conduzidos por instrutores.
            Líder em SSE. Agora é líder em SASE de fornecedor único.
            A Netskope é reconhecida como a líder mais avançada em visão para as plataformas SSE e SASE
            2X é líder no Quadrante Mágico do Gartner® para plataformas SASE
            Uma plataforma unificada criada para sua jornada
              Protegendo a IA generativa para leigos
              Protegendo a IA generativa para leigos
              Saiba como sua organização pode equilibrar o potencial inovador da IA generativa com práticas robustas de segurança de dados.
                E-book moderno sobre prevenção de perda de dados (DLP) para leigos
                Prevenção Contra Perda de Dados (DLP) Moderna para Leigos
                Obtenha dicas e truques para fazer a transição para um DLP fornecido na nuvem.
                  Livro SD-WAN moderno para SASE Dummies
                  SD-WAN moderno para leigos em SASE
                  Pare de brincar com sua arquitetura de rede
                    Compreendendo onde estão os riscos
                    O Advanced Analytics transforma a maneira como as equipes de operações de segurança aplicam insights orientados por dados para implementar políticas melhores. Com o Advanced Analytics, o senhor pode identificar tendências, concentrar-se em áreas de preocupação e usar os dados para tomar medidas.
                        Suporte Técnico Netskope
                        Suporte Técnico Netskope
                        Nossos engenheiros de suporte qualificados estão localizados em todo o mundo e têm diversas experiências em segurança de nuvem, rede, virtualização, fornecimento de conteúdo e desenvolvimento de software, garantindo assistência técnica de qualidade e em tempo hábil.
                          Vídeo da Netskope
                          Treinamento Netskope
                          Os treinamentos da Netskope vão ajudar você a ser um especialista em segurança na nuvem. Conte conosco para ajudá-lo a proteger a sua jornada de transformação digital e aproveitar ao máximo as suas aplicações na nuvem, na web e privadas.

                            Preventing Recent Microsoft Exchange Vulnerabilities and Similar Attacks Using Netskope Private Access

                            Mar 30 2021

                            On March 2, Microsoft released patches to address four zero-day vulnerabilities in Microsoft Exchange Server software. Those vulnerabilities, known collectively as ProxyLogon, affect on-premises Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019. (Exchange Online, which is part of Microsoft 365, has not been affected.) 

                            This Exchange Server attack is the kind of industry-wide security event that may have even broader implications than the SolarWinds attack. Reports indicated that cybercriminals were already able to breach more than 30,000 organizations due to this active exploitation, and the number of attempted attacks observed against vulnerable Exchange Servers increased by orders of magnitude. Roughly 125,000 Exchange servers might still be vulnerable.

                            If you read into the technical details published about the attacks, you observe that essentially an entire kill chain occurred, meaning there were multiple vulnerabilities in Exchange Servers and an attacker would need to exploit several, or all of them, to achieve a successful attack. The first of the vulnerabilities, a remote code execution exploit, is a network-based vulnerability,  specifically referencing how attackers could connect to internet-facing Exchange Servers and escalate their level of access, without needing to steal a password or find another means of compromise. 

                            As the CVE notification explains, “The initial attack requires the ability to make an untrusted connection to the Exchange Server on Port 443. … This can be protected against by restricting untrusted connections, or by setting a VPN to separate the Exchange Server from external access.”

                            It’s important here to note that firewalls wouldn’t have prevented this attack in most cases, as it was a zero-day attack. Web application firewall (WAF) vendors are only now reactively rolling out updated rulesets to detect this attack, and those protections apply if the WAF is performing SSL decryption. It’s better to prevent attacks in the first place rather than catch them after the fact. 

                            Taking a Zero Trust approach to security prevents exposure to these types of attacks, because it stops unauthenticated access to sensitive resources, and it serves to provide protection against emergent threats such as what we have seen now that the exploit is in the wild. If you’re using Netskope, the Microsoft Exchange attack doesn’t happen, because the first vulnerability is completely mitigated. Applications that are not public-facing should not be on the internet. By putting corporate applications behind Netskope Private Access (NPA), vulnerable applications aren’t reachable by attackers.

                            With NPA, there are no untrusted connections, and zero trust principles are judiciously applied to every point of network access. If an Exchange Server sits behind NPA, it has no direct exposure to the public internet, and users would connect to it using a Netskope client. Once Netskope has authenticated that user—that is, Netskope has done a posture check, determined who the user is, and what the user’s characteristics are—the user can connect only to Exchange or to other services authorized by the user.

                            The advantages of NPA over a VPN

                            NPA provides Zero Trust Network Access (ZTNA) to private applications and data in hybrid IT (public cloud and data center) environments. It offers seamless connectivity for authenticated users, supports any application and protocol, reduces business risk, and simplifies IT infrastructure. 

                            NPA also goes well beyond the capabilities of a remote access VPN to deliver an exceptional user experience—something often lacking in standard VPN configurations trying to access key resources like Exchange. The chart below highlights some of the key advantages of NPA over typical remote access VPNs. 

                            If you’d like to get started with NPA, contact us today to schedule a demo.

                            CapabilityRemote Access VPNNetskope
                            Private Access
                            Access to behind-the-firewall resources in the datacenter
                            Strong user authentication
                            Device posture checking
                            Application access, not network access
                            Fan-out for cloud and data center environments
                            Transparent end user experience
                            Delivered as service from the cloud
                            author image
                            Kevin Sapp
                            Kevin Sapp is a senior director of product management at Netskope. He is responsible for managing our Zero Trust Network Access product portfolio.
                            Kevin Sapp is a senior director of product management at Netskope. He is responsible for managing our Zero Trust Network Access product portfolio.
                            Conecte-se com a Netskope

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.