Netskope named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Service Edge. Get the Report.

  • Plataforma

    Visibilidade incomparável e proteção de dados e contra ameaças em tempo real na maior nuvem privada de segurança do mundo.

  • Produtos

    Os produtos Netskope são construídos na Netskope Security Cloud.

A Netskope oferece uma pilha de segurança na nuvem moderna, com capacidade unificada para proteção de dados e ameaças, além de acesso privado seguro.

Explore a nossa plataforma

Netskope é nomeada Líder no Relatório do Quadrante Mágico™ do Gartner de 2022 para SSE

Obtenha o Relatório

Mude para serviços de segurança na nuvem líderes de mercado com latência mínima e alta confiabilidade.

Saiba mais

Previna ameaças que muitas vezes contornam outras soluções de segurança usando uma estrutura SSE de passagem única.

Saiba mais

Soluções de zero trust para a implementação de SSE e SASE

Saiba mais

A Netskope permite uma jornada segura, inteligente e rápida para a adoção de serviços em nuvem, aplicações e infraestrutura de nuvem pública.

Saiba mais
  • Customer Success

    Proteja a sua jornada de transformação digital e aproveite ao máximo as suas aplicações na nuvem, na web e privadas.

  • Atendimento ao cliente

    Suporte proativo e o compromisso em otimizar seu ambiente da Netskope e acelerar seu sucesso.

  • Treinamento e certificação

    Netskope training will help you become a cloud security expert.

Confie na Netskope para ajudar você a enfrentar ameaças emergentes, novos riscos, mudanças tecnológicas, mudanças organizacionais e de rede, e novos requisitos regulatórios.

Saiba mais

Contamos com engenheiros qualificados no mundo todo, com experiências variadas em segurança na nuvem, redes, virtualização, entrega de conteúdo e desenvolvimento de software, prontos para prestar assistência técnica oportuna e de alta qualidade.

Saiba mais

Proteja sua jornada de transformação digital e aproveite ao máximo seus aplicativos de nuvem, web e privados com o treinamento da Netskope.

Saiba mais
  • Recursos

    Saiba mais sobre como a Netskope pode ajudá-lo a proteger sua jornada para a nuvem.

  • Blog

    Saiba como a Netskope viabiliza a segurança e a transformação de redes através do security service edge (SSE).

  • Eventos e workshops

    Esteja atualizado sobre as últimas tendências de segurança e conecte-se com seus pares.

  • Security Defined

    Tudo o que você precisa saber em nossa enciclopédia de segurança cibernética.

Podcast Security Visionaries

Episódio bônus: a importância do Security Service Edge (SSE)

Reproduzir o podcast

Leia as últimas novidades sobre como a Netskope pode viabilizar a jornada Zero Trust e SASE por meio dos recursos do security service edge (SSE).

Leia o Blog

Netskope na RSA 2022

Conheça e converse com especialistas em segurança da Netskope na RSA.

Saiba mais

O que é o Security Service Edge?

Explore o lado de segurança de SASE, o futuro da rede e proteção na nuvem.

Saiba mais
  • Empresa

    Ajudamos você a antecipar os desafios da nuvem, dos dados e da segurança da rede.

  • Por que Netskope

    A transformação da nuvem e o trabalho em qualquer lugar mudaram a forma como a segurança precisa funcionar.

  • Liderança

    Nossa equipe de liderança está fortemente comprometida em fazer tudo o que for preciso para tornar nossos clientes bem-sucedidos.

  • Parceiros

    Fazemos parceria com líderes de segurança para ajudá-lo a proteger sua jornada para a nuvem.

A Netskope possibilita o futuro do trabalho.

Saiba mais

A Netskope está redefinindo a nuvem, os dados e a segurança da rede para ajudar as organizações a aplicar os princípios de Zero Trust para proteger os dados.

Saiba mais

Pensadores, construtores, sonhadores, inovadores. Juntos, fornecemos soluções de segurança na nuvem de última geração para ajudar nossos clientes a proteger seus dados e seu pessoal.

Meet our team

A estratégia de comercialização da Netskope, focada em Parcerias, permite que nossos Parceiros maximizem seu crescimento e lucratividade enquanto transformam a segurança corporativa.

Saiba mais
Produtos Netskope platform capabilities Netskope threat protection

Netskope Threat Protection

Decodes and inspects traffic that other security solutions cannot, such as unmanaged cloud services, sync clients, mobile apps, and TLS-encrypted cloud services and websites, to identify and address threats.

Threat protection like no other

Netskope is the only unified cloud access security broker (CASB) and next generation secure web gateway (SWG) that combines a unique cloud-native vantage point, multiple layers of threat detection, and remediation capabilities to deliver comprehensive threat protection for cloud and web services.

Relatório de nuvem e ameaças: tendências globais de malware na nuvem e na Web

In this edition of the Cloud Threat Report, we examine the past twelve months of malware downloads from the cloud and web. We highlight continued dominance of Trojans and of malware that targets Microsoft Windows, and a rise in malicious PDF files linked from popular search engine results.

Relatório de nuvem e ameaças: tendências globais de malware na nuvem e na Web

The Netskope
Security Cloud

Visibilidade incomparável. Proteção de dados e contra ameaças em tempo real.

Netskope Intelligent SSE is built on the Netskope Security Cloud, a platform that provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device.

Conheça nossa plataforma

Cloud-focused threat protection use cases

01

Malware prevention

Inspect your managed cloud services, such as Office 365 and Box, and inline cloud and website traffic for malware. Stop its spread by quarantining and replacing suspicious files with inert tombstone files, or blocking inline downloads.

02

Advanced threat protection

Ensure defenses match your needs, with prevention, detection, and advanced AI/ML-based threat analysis options and integration with your existing security infrastructure.

03

Detect behavior anomalies

Take advantage of user and entity behavior analytics (UEBA) to baseline activities and detect anomalies, in real time. Also, detect unusual and excessive data movement, insider threats, or compromised credentials.

04

Prevent cloud phishing

Reduce the attack surface created by the managed cloud services your users trust and attackers target. Detect credential inputs into cloud-hosted fake phishing forms legacy defenses miss.

05

 Hosting Payloads

Legacy defenses with allow/deny controls open the door for cloud hosted payloads in apps and cloud services as they rarely deny them, cannot inspect the content, and users trust these domains with valid certificates. Netskope inspects cloud and web traffic for threats, plus applies granular policy controls based on data context.

06

Malicious Documents

Since the pandemic, malicious Office documents have increased targeting remote working users and evading legacy defenses. Netskope inspects cloud and web traffic for malicious Office documents using a supervised machine-learning classifier trained and kept current with production data.

Attacks are evading legacy web and email defenses

Rogue accounts

Attackers use rogue account instances within trusted managed cloud services and apps to share and deliver malicious payloads. Legacy defenses typically don’t know account owners, but Netskope Cloud XDTM understands the user, app, instance, risk, data, and activity, so it can block rogue instances and prevent this attack vector.

Tailored attacks

Attackers conduct reconnaissance to identify your company’s preferred cloud services and apps and then creates fake login screens for these services to entice users to access, expose credentials, and possibly download payloads. Netskope Cloud XD analyzes cloud service hosting accounts, so it can identify and block fake login pages.

Cloud phishing

Attacker evades legacy web and email defenses by delivering phishing attack elements from trusted managed cloud services using a rogue account instance. Netskope understands the difference between company and rogue instances for your managed cloud services, such as AWS, Azure, GitHub, Box, or Drive to block cloud phishing.

Hosting payloads

Legacy inline defenses often deploy ‘allow policies’ for all the services adopted by different lines of business, departments, and users. This opens the door to attack payloads being hosted in the cloud. Netskope can apply granular policies to both your managed and unmanaged clouds, to determine company approved account instances.

Cloud-based C2

Attackers use the cloud for command-n-control (C2) communications. Recently, an attacker used Slack for C2, knowing the company allowed it through legacy defenses. Instead of a broad ‘allow all’ for cloud services and apps, Netskope enables you to enforce granular user and account instance-aware policies to pinpoint and mitigate risks.

A solução nativa na nuvem Netskope ZTNA (acesso zero trust à rede) fornece acesso seguro a aplicações em ambientes híbridos de TI, reduzindo a expansão de equipamentos de soluções legadas de acesso ponto a ponto, como VPNs.

Data exfiltration

Unprotected cloud storage that leads to data exposure is well known, however, data can also be exfiltrated through rogue accounts in managed cloud services. Netskope provides Data Loss Prevention (DLP) defenses and granular policy controls that are aware of user, app, instance, risk, data and activity to prevent data loss.

Rogue accounts

Attackers use rogue account instances within trusted managed cloud services and apps to share and deliver malicious payloads. Legacy defenses typically don’t know account owners, but Netskope Cloud XDTM understands the user, app, instance, risk, data, and activity, so it can block rogue instances and prevent this attack vector.

Tailored attacks

Attackers conduct reconnaissance to identify your company’s preferred cloud services and apps and then creates fake login screens for these services to entice users to access, expose credentials, and possibly download payloads. Netskope Cloud XD analyzes cloud service hosting accounts, so it can identify and block fake login pages.

Cloud phishing

Attacker evades legacy web and email defenses by delivering phishing attack elements from trusted managed cloud services using a rogue account instance. Netskope understands the difference between company and rogue instances for your managed cloud services, such as AWS, Azure, GitHub, Box, or Drive to block cloud phishing.

Hosting payloads

Legacy inline defenses often deploy ‘allow policies’ for all the services adopted by different lines of business, departments, and users. This opens the door to attack payloads being hosted in the cloud. Netskope can apply granular policies to both your managed and unmanaged clouds, to determine company approved account instances.

Cloud-based C2

Attackers use the cloud for command-n-control (C2) communications. Recently, an attacker used Slack for C2, knowing the company allowed it through legacy defenses. Instead of a broad ‘allow all’ for cloud services and apps, Netskope enables you to enforce granular user and account instance-aware policies to pinpoint and mitigate risks.

Data exfiltration

Unprotected cloud storage that leads to data exposure is well known, however, data can also be exfiltrated through rogue accounts in managed cloud services. Netskope provides Data Loss Prevention (DLP) defenses and granular policy controls that are aware of user, app, instance, risk, data and activity to prevent data loss.

Principais recursos e benefícios

Gain full visibility

See what’s going on with inline encrypted traffic en route to and from cloud services and websites, as well as all your files stored in managed cloud services to prevent known threats and detect the unknown.

Mais informações
Netskope advanced data loss protection (DLP)

Prevent threats and data exfiltration

Leverage multiple prevention defense layers, threat intelligence feeds, automated IOC sharing, UEBA anomaly detection including data exfiltration, remote browser isolation, plus granular policy controls using data context.

Mais informações

Detect and hunt threats

Use multiple detection defenses, including machine learning anomaly detection and sandboxing, to uncover unknown threats, plus leverage 90 days of rich metadata for investigations and threat hunting.

Mais informações

Leverage cloud threat intelligence

Benefit from the insights of Netskope Threat Research Labs, which is dedicated to the discovery and analysis of new cloud threats, alongside 40+ shared threat intelligence sources, for up-to-the-minute protection against the threats you are facing.

Mais informações

Quickly respond to threats

Block or quarantine attacks before they can do any damage and take advantage of automated workflows to further analyze and reverse the effects of known threats. Plus, integrate and share threat intelligence and incident details with other security solutions in your infrastructure to coordinate responses.

Mais informações

It’s a cloud and mobile usage world today and if you’re not thinking about that from a threat propagation point of view, you’re flying blind. At the core of our CASB project was solving this side of the cloud enablement equation and Netskope gives us that power.

—CISO, Leading High Tech Company

Empresas Líderes confiam na Netskope

Apria Healthcare
Ather
AVX
CSA Group
Evalueserve
Stroock

Recursos

Netskope Behavior Analytics (BA) Data Sheet

Netskope Behavior Analytics

Netskope Cloud Threat Exchange

Netskope Cloud Threat Exchange

Netskope Advanced Analytics

Netskope Advanced Analytics

Netskope Remote Browser Isolation

Netskope Remote Browser Isolation

Guia de Adoção de SASE

Guia de Adoção de SASE

Cybersecurity Insiders – Zero Trust Report 2020

Cybersecurity Insiders – Zero Trust Report 2020

Netskope Threat Protection - data sheet

Netskope Threat Protection

Demonstração – Netskope e CrowdStrike

Demonstração – Netskope e CrowdStrike

Cloud and Threat Report - February 2020 Edition

Cloud and Threat Report - February 2020 Edition

Shift your threat prevention to the cloud, for the cloud

61%

of malware is cloud delivered

Fonte: Netskope Cloud and Threat Report, 2021

27%

of malware is malicious documents

Fonte: Netskope Cloud and Threat Report, 2021

Acelere seu programa de segurança com o líder em SASE.