Netskope Threat Protection

Decodes and inspects traffic that other security solutions cannot, such as unmanaged cloud services, sync clients, mobile apps, and TLS-encrypted cloud services and websites, to identify and address threats.

Threat protection like no other

Netskope is the only unified cloud access security broker (CASB) and next generation secure web gateway (SWG) that combines a unique cloud-native vantage point, multiple layers of threat detection, and remediation capabilities to deliver comprehensive threat protection for cloud and web services.

Cloud and Threat Report: July 2021 Edition

Hey, You, Get Out of my Cloud

 

Data risks and emerging threats are in the spotlight in the July 2021 edition of the Cloud and Threat Report. The continued growth of malware delivered by cloud applications and the potential for critical data exfiltration tied to employees departing their jobs are among increasing cloud application security risks.

 

Netskope Threat Labs dives into these trends in the latest installment of the semi-annual Cloud and Threat Report.

Cloud and Threat Report: July 2021 Edition

The Netskope
Security Cloud

Conheça nossa plataforma
A Netskope Security Cloud

Visibilidade incomparável. Proteção de dados e contra ameaças em tempo real.

A Netskope Security Cloud oferece visibilidade inigualável em tempo real, detecção de ameaças e proteção de dados a partir de qualquer local e de qualquer dispositivo. Somente Netskope entende profundamente a nuvem e adota uma abordagem centrada em dados, que confere às equipes de segurança o equilíbrio perfeito entre proteção e velocidade de que precisam, para garantir sua jornada de transformação digital.

A Netskope Security Cloud

Cloud-focused threat protection use cases

01

Malware prevention

Inspect your managed cloud services, such as Office 365 and Box, and inline cloud and website traffic for malware. Stop its spread by quarantining and replacing suspicious files with inert tombstone files, or blocking inline downloads.

02

Advanced threat protection

Ensure defenses match your needs, with prevention, detection, and advanced AI/ML-based threat analysis options and integration with your existing security infrastructure.

03

Detect behavior anomalies

Take advantage of user and entity behavior analytics (UEBA) to baseline activities and detect anomalies, in real time. Also, detect unusual and excessive data movement, insider threats, or compromised credentials.

04

Prevent cloud phishing

Reduce the attack surface created by the managed cloud services your users trust and attackers target. Detect credential inputs into cloud-hosted fake phishing forms legacy defenses miss.

05

 Hosting Payloads

Legacy defenses with allow/deny controls open the door for cloud hosted payloads in apps and cloud services as they rarely deny them, cannot inspect the content, and users trust these domains with valid certificates. Netskope inspects cloud and web traffic for threats, plus applies granular policy controls based on data context.

06

Malicious Documents

Since the pandemic, malicious Office documents have increased targeting remote working users and evading legacy defenses. Netskope inspects cloud and web traffic for malicious Office documents using a supervised machine-learning classifier trained and kept current with production data.

Attacks are evading legacy web and email defenses

Rogue accounts

Attackers use rogue account instances within trusted managed cloud services and apps to share and deliver malicious payloads. Legacy defenses typically don’t know account owners, but Netskope Cloud XDTM understands the user, app, instance, risk, data, and activity, so it can block rogue instances and prevent this attack vector.

Tailored attacks

Attackers conduct reconnaissance to identify your company’s preferred cloud services and apps and then creates fake login screens for these services to entice users to access, expose credentials, and possibly download payloads. Netskope Cloud XD analyzes cloud service hosting accounts, so it can identify and block fake login pages.

Cloud phishing

Attacker evades legacy web and email defenses by delivering phishing attack elements from trusted managed cloud services using a rogue account instance. Netskope understands the difference between company and rogue instances for your managed cloud services, such as AWS, Azure, GitHub, Box, or Drive to block cloud phishing.

Hosting payloads

Legacy inline defenses often deploy ‘allow policies’ for all the services adopted by different lines of business, departments, and users. This opens the door to attack payloads being hosted in the cloud. Netskope can apply granular policies to both your managed and unmanaged clouds, to determine company approved account instances.

Cloud-based C2

Attackers use the cloud for command-n-control (C2) communications. Recently, an attacker used Slack for C2, knowing the company allowed it through legacy defenses. Instead of a broad ‘allow all’ for cloud services and apps, Netskope enables you to enforce granular user and account instance-aware policies to pinpoint and mitigate risks.

A solução nativa na nuvem Netskope ZTNA (acesso zero trust à rede) fornece acesso seguro a aplicações em ambientes híbridos de TI, reduzindo a expansão de equipamentos de soluções legadas de acesso ponto a ponto, como VPNs.

Data exfiltration

Unprotected cloud storage that leads to data exposure is well known, however, data can also be exfiltrated through rogue accounts in managed cloud services. Netskope provides Data Loss Prevention (DLP) defenses and granular policy controls that are aware of user, app, instance, risk, data and activity to prevent data loss.

Rogue accounts

Attackers use rogue account instances within trusted managed cloud services and apps to share and deliver malicious payloads. Legacy defenses typically don’t know account owners, but Netskope Cloud XDTM understands the user, app, instance, risk, data, and activity, so it can block rogue instances and prevent this attack vector.

Tailored attacks

Attackers conduct reconnaissance to identify your company’s preferred cloud services and apps and then creates fake login screens for these services to entice users to access, expose credentials, and possibly download payloads. Netskope Cloud XD analyzes cloud service hosting accounts, so it can identify and block fake login pages.

Cloud phishing

Attacker evades legacy web and email defenses by delivering phishing attack elements from trusted managed cloud services using a rogue account instance. Netskope understands the difference between company and rogue instances for your managed cloud services, such as AWS, Azure, GitHub, Box, or Drive to block cloud phishing.

Hosting payloads

Legacy inline defenses often deploy ‘allow policies’ for all the services adopted by different lines of business, departments, and users. This opens the door to attack payloads being hosted in the cloud. Netskope can apply granular policies to both your managed and unmanaged clouds, to determine company approved account instances.

Cloud-based C2

Attackers use the cloud for command-n-control (C2) communications. Recently, an attacker used Slack for C2, knowing the company allowed it through legacy defenses. Instead of a broad ‘allow all’ for cloud services and apps, Netskope enables you to enforce granular user and account instance-aware policies to pinpoint and mitigate risks.

Data exfiltration

Unprotected cloud storage that leads to data exposure is well known, however, data can also be exfiltrated through rogue accounts in managed cloud services. Netskope provides Data Loss Prevention (DLP) defenses and granular policy controls that are aware of user, app, instance, risk, data and activity to prevent data loss.

Principais recursos e benefícios

Gain full visibility

See what’s going on with inline encrypted traffic en route to and from cloud services and websites, as well as all your files stored in managed cloud services to prevent known threats and detect the unknown.

Mais informações
Netskope advanced data loss protection (DLP)

Prevent threats and data exfiltration

Leverage multiple prevention defense layers, threat intelligence feeds, automated IOC sharing, UEBA anomaly detection including data exfiltration, remote browser isolation, plus granular policy controls using data context.

Mais informações

Detect and hunt threats

Use multiple detection defenses, including machine learning anomaly detection and sandboxing, to uncover unknown threats, plus leverage 90 days of rich metadata for investigations and threat hunting.

Mais informações

Leverage cloud threat intelligence

Benefit from the insights of Netskope Threat Research Labs, which is dedicated to the discovery and analysis of new cloud threats, alongside 40+ shared threat intelligence sources, for up-to-the-minute protection against the threats you are facing.

Mais informações

Quickly respond to threats

Block or quarantine attacks before they can do any damage and take advantage of automated workflows to further analyze and reverse the effects of known threats. Plus, integrate and share threat intelligence and incident details with other security solutions in your infrastructure to coordinate responses.

Mais informações

It’s a cloud and mobile usage world today and if you’re not thinking about that from a threat propagation point of view, you’re flying blind. At the core of our CASB project was solving this side of the cloud enablement equation and Netskope gives us that power.

—CISO, Leading High Tech Company

Empresas Líderes confiam na Netskope

Apria Healthcare
Ather
AVX
CSA Group
Evalueserve
Stroock

Recursos

Netskope Cloud Threat Exchange

Netskope Cloud Threat Exchange

Netskope Advanced Analytics

Netskope Advanced Analytics

Netskope Remote Browser Isolation

Netskope Remote Browser Isolation

Guia de Adoção de SASE

Guia de Adoção de SASE

Cybersecurity Insiders - 2020 Zero Trust Report

Cybersecurity Insiders - 2020 Zero Trust Report

Netskope Threat Protection - data sheet

Netskope Threat Protection

Demo - Netskope and CrowdStrike

Demo - Netskope and CrowdStrike

Cloud and Threat Report - February 2020 Edition

Cloud and Threat Report - February 2020 Edition

Shift your threat prevention to the cloud, for the cloud

61%

of malware is cloud delivered

Fonte: Netskope Cloud and Threat Report, 2021

27%

of malware is malicious documents

Fonte: Netskope Cloud and Threat Report, 2021

Accelerate your security program with the SASE leader.