Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Netskope © 2015, Optiv Security Inc. © 2015
5 Highest-Impact CASB Use Cases
Bob Gilbert, Chief Evangelist
Netskope
Netskope © 2015, Optiv Security Inc. © 2015
“By 2017, organizations that have made a strategic decision to
invest in cloud...
© 2016 Netskope. All Rights Reserved.
What is a Cloud Access Security Broker?
3
• Defined by Gartner in 2012;
• Cloud-base...
© 2016 Netskope. All Rights Reserved.
Gartner’s Four Pillars of CASB
4
VISIBILITY
DATA SECURITY
COMPLIANCE
THREAT
PROTECTI...
What is driving the need for a CASB?
5
Netskope © 2015, Optiv Security Inc. © 2015
There are 22,000 enterprise
apps today (and growing).
© 2016 Netskope. All Rights Reserved.
917 Apps Per Enterprise – It’s Easy to Buy and Use Them!
7
10%
70%
20%
MostlyUnsanct...
© 2016 Netskope. All Rights Reserved.
How Much of Your Business Data is in the Cloud?
8
30%
Data Breaches
Failed Audits =
Fines, Penalties
Loss or Theft of IP
or Sensitive Data
Loss of
Reputation,
Business
Disrupti...
© 2016 Netskope. Company Confidential
Four ways users interact with cloud apps (Office 365 example)
10
Web
Browser
Mobile
...
© 2016 Netskope. Company Confidential
Safe cloud enablement starts with covering all sources
11
Browser
Sync
Client
Mobile...
5 Highest-Impact
CASB Use Cases
Use Case #1
Discover cloud
apps, find sensitive
data, and assess
risk
14
1. Find all cloud apps and report
on enterprise-readiness of
each cloud app using 45+
criteria
2. Report on sensitive d...
Use Case #2
Prevent data
exfiltration
from sanctioned to
unsanctioned
cloud apps
Source: AT&T Cybersecurity Insights
16
CASB
Requirements
1. Inline deployment options to get
access to both sanctioned and
unsanctioned cloud traffic
2. Abili...
Use Case #3
Allow cloud apps
instead being forced
to block them
outright
18
1. See detail about real-time
activities across all cloud
apps
2. Support for category-level
policies such as ‘social
m...
Use Case #4
Provide granular
access control for
managed and
unmanaged devices
20
1. Ability to classify managed vs.
unmanaged devices
2. Ability to set policies based
on device classification
3. Suppo...
Use Case #5
Find malware in
sanctioned apps,
remediate, and
reverse attack
fan-out
22
1. Ability to scan sanctioned cloud apps for
various malware types and quarantine
the files
2. Ability to replace the e...
The Leading Cloud Access
Security Broker
Allow cloud apps instead being
forced to block them outright
Prevent data exfiltr...
Netskope © 2015, Optiv Security Inc. © 2015
THANK YOU!
Upcoming SlideShare
Loading in …5
×

5 Highest-Impact CASB Use Cases

3,431 views

Published on

Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in Salesforce, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations.

This presentation covers the top five CASB use cases that have the highest impact on cloud-consuming enterprises.

Published in: Technology
  • Be the first to comment

5 Highest-Impact CASB Use Cases

  1. 1. Netskope © 2015, Optiv Security Inc. © 2015 5 Highest-Impact CASB Use Cases Bob Gilbert, Chief Evangelist Netskope
  2. 2. Netskope © 2015, Optiv Security Inc. © 2015 “By 2017, organizations that have made a strategic decision to invest in cloud applications for mission-critical workloads will consider CASBs to be an essential security control.” © 2016 Netskope. All Rights Reserved. 2
  3. 3. © 2016 Netskope. All Rights Reserved. What is a Cloud Access Security Broker? 3 • Defined by Gartner in 2012; • Cloud-based or on-premises; • Sits between user and cloud app; • Visibility and control of cloud apps as they are accessed; • Example policies: Authorization, encryption, tokenization, logging, alerting, authentication
  4. 4. © 2016 Netskope. All Rights Reserved. Gartner’s Four Pillars of CASB 4 VISIBILITY DATA SECURITY COMPLIANCE THREAT PROTECTION
  5. 5. What is driving the need for a CASB? 5
  6. 6. Netskope © 2015, Optiv Security Inc. © 2015 There are 22,000 enterprise apps today (and growing).
  7. 7. © 2016 Netskope. All Rights Reserved. 917 Apps Per Enterprise – It’s Easy to Buy and Use Them! 7 10% 70% 20% MostlyUnsanctionedSanctioned IT-led Business-led User-led
  8. 8. © 2016 Netskope. All Rights Reserved. How Much of Your Business Data is in the Cloud? 8 30%
  9. 9. Data Breaches Failed Audits = Fines, Penalties Loss or Theft of IP or Sensitive Data Loss of Reputation, Business Disruption © 2016 Netskope. All Rights Reserved. 9
  10. 10. © 2016 Netskope. Company Confidential Four ways users interact with cloud apps (Office 365 example) 10 Web Browser Mobile App App Ecosystem Sync Client
  11. 11. © 2016 Netskope. Company Confidential Safe cloud enablement starts with covering all sources 11 Browser Sync Client Mobile App App Ecosystem • Are risky activities taking place? • Is sensitive data leaking? Where? • Do users with unmanaged devices have the same level of access as users with managed devices? • What is your exposure to threats such as malware or ransomware?
  12. 12. 5 Highest-Impact CASB Use Cases
  13. 13. Use Case #1 Discover cloud apps, find sensitive data, and assess risk
  14. 14. 14 1. Find all cloud apps and report on enterprise-readiness of each cloud app using 45+ criteria 2. Report on sensitive data being shared publicly and outside your company 3. Deployment requirements typically include logs, TAP mode, or inline for apps and APIs for data CASB Requirements
  15. 15. Use Case #2 Prevent data exfiltration from sanctioned to unsanctioned cloud apps Source: AT&T Cybersecurity Insights
  16. 16. 16 CASB Requirements 1. Inline deployment options to get access to both sanctioned and unsanctioned cloud traffic 2. Ability to decode details in real-time about activity and data 3. Ability to associate personal and corporate cloud app account credentials 4. Ability to correlate events and perform anomaly detection 5. Need to see cloud usage details from browsers, sync clients, and mobile apps
  17. 17. Use Case #3 Allow cloud apps instead being forced to block them outright
  18. 18. 18 1. See detail about real-time activities across all cloud apps 2. Support for category-level policies such as ‘social media’ 3. Cloud DLP engine to focus your policy on specific data and use cases 4. Ability to apply context to your policies CASB Requirements
  19. 19. Use Case #4 Provide granular access control for managed and unmanaged devices
  20. 20. 20 1. Ability to classify managed vs. unmanaged devices 2. Ability to set policies based on device classification 3. Support for granular policies based on device classification CASB Requirements
  21. 21. Use Case #5 Find malware in sanctioned apps, remediate, and reverse attack fan-out
  22. 22. 22 1. Ability to scan sanctioned cloud apps for various malware types and quarantine the files 2. Ability to replace the eradicated malware with a tombstone file, letting the user know of the action taken CASB Requirements
  23. 23. The Leading Cloud Access Security Broker Allow cloud apps instead being forced to block them outright Prevent data exfiltration across all cloud apps Discover cloud apps, find sensitive data, and assess risk Provide granular access control for managed and unmanaged devices Find malware in sanctioned apps, remediate, and reverse attack fan-out Don’t leave users in the dark, coach them on safe usage ✓ ✓ ✓ ✓ ✓ ✓
  24. 24. Netskope © 2015, Optiv Security Inc. © 2015 THANK YOU!

×