SlideShare a Scribd company logo
1 of 14
Meet the Authors
Ravi Ithal
Chief Architect
Krishna Narayanaswamy
Chief Scientist
Steve Malmskog
Chief Network Architect
Lebin Cheng
VP, Application Engineering
What We’ll Discuss
• Short commercial break: Introducing Netskope
• Cloud Security for Dummies – The 10 “Must Haves”
• Finding and evaluating risk
• Cloud security in practice
• What makes a great cloud security policy
Find, Understand, and
Secure Cloud Apps for
Safe Cloud Enablement
• Real-time, granular control of any
cloud app, sanctioned or not
• Deep contextual visibility
• Comprehensive end-point
coverage and flexible deployment
The Netskope Active Platform™
Actual:
613
IT estimate:
40-50 88% cloud apps aren’t
enterprise-ready
Safely enable apps you
already know about
App Redundancy:
• 67 Marketing
• 43 Collaboration
• 38 HR
• 31 Finance
• 28 Storage
• 25 CRM
Discover and control apps
you don’t know about
Data
Activity
App
Identity
Find Understand Secure
IT-led
Business-led
User-led
ServicesDeepContext
Flexible Deployment Options
Native Thick-client Apps
Native Mobile Apps
Browser-based Apps
Remote users
Control Sanctioned or
Unsanctioned Apps
Comprehensive
End-point Coverage
Agentless Reverse Proxy Thin Agent API Connectors Log Analysis
SOC-1, SOC-2, Type I and II worldwide cloud On-premises secure appliance
In-Line Deployment Options Out-of-Band Deployment Options
Ten “Must Haves” for Safe Cloud Enablement
7
Discover apps
and assess risk
Segment apps
sanctioned/unsanctioned
Secure access to apps
with SSO
Audit activities
user/admin/data
Understand content
to, from, and in apps
Detect anomalies
risky behavior, security threats
Enforce granular policies
in real-time, across any app
Protect data in context
who, what, where, activity, data
Ensure compliance
audit trails, remediation, reporting
Coach users
via conversations and automated
© 2015 Netskope. All Rights Reserved.
Best practices that were demonstrated in this webinar
• Understand the risk in their organization
• conduct forensics around stolen content
• Set granular policies
What Makes a Great
Policy?
10
SANCTIONED UNSANCTIONED
© 2015 Netskope. All Rights Reserved.
11
App
Introspection
Inspection
Secure content in the app,
no matter when uploaded
Secure content en route
to or from the app
12
User Location Device
Time
Activity
Context
Content
Risk
w/Whom
Allow is the new block (allow is new block green light slide)
13
© 2015 Netskope. All Rights Reserved.
Thanks for Attending! Questions?
14
rithal@netskope.com, @ravi_ithal
krishna@netskope.com, @Krishna_Nswamy
lebinc@netskope.com, @LBCnetskope
stevem@netskope.com
sales@netskope.com, @Netskope

More Related Content

Viewers also liked

Programa festa major sabadell 2013 diumenge 8
Programa festa major sabadell 2013 diumenge 8Programa festa major sabadell 2013 diumenge 8
Programa festa major sabadell 2013 diumenge 8iSabadell
 
ECOGAS améliore sa relation fournisseurs grâce à la dématérialisation de ses ...
ECOGAS améliore sa relation fournisseurs grâce à la dématérialisation de ses ...ECOGAS améliore sa relation fournisseurs grâce à la dématérialisation de ses ...
ECOGAS améliore sa relation fournisseurs grâce à la dématérialisation de ses ...ESKER
 
Bambole Fatte A Mano
Bambole Fatte A ManoBambole Fatte A Mano
Bambole Fatte A ManoCinzia Racca
 
Project planning form
Project planning formProject planning form
Project planning formltilem
 
Learn about a Live WebShow Video Channel and Video email
Learn about a Live WebShow Video Channel and Video emailLearn about a Live WebShow Video Channel and Video email
Learn about a Live WebShow Video Channel and Video emailBusiness Growth Coach
 
Vishnu Shanker's Portfolio
Vishnu Shanker's Portfolio Vishnu Shanker's Portfolio
Vishnu Shanker's Portfolio Vishnu Shanker
 
Mi ct 30 ct-40 ct-50 - Servicio Tecnico Fagor
Mi ct 30 ct-40 ct-50 - Servicio Tecnico FagorMi ct 30 ct-40 ct-50 - Servicio Tecnico Fagor
Mi ct 30 ct-40 ct-50 - Servicio Tecnico Fagorserviciotecnicofagor
 
Security managers july 2015 (1)
Security managers july 2015 (1)Security managers july 2015 (1)
Security managers july 2015 (1)Arthur Schmunk
 
Nuestro día D...NI OLVIDO NI PERDÓN
Nuestro día D...NI OLVIDO NI PERDÓNNuestro día D...NI OLVIDO NI PERDÓN
Nuestro día D...NI OLVIDO NI PERDÓNinsn
 
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIfinance40
 
Get Your Gamestorming On! Shift the Paradigm of Requirements Gathering
Get Your Gamestorming On! Shift the Paradigm of Requirements GatheringGet Your Gamestorming On! Shift the Paradigm of Requirements Gathering
Get Your Gamestorming On! Shift the Paradigm of Requirements GatheringMichelle Caldwell, PSM, SSGB
 

Viewers also liked (14)

Programa festa major sabadell 2013 diumenge 8
Programa festa major sabadell 2013 diumenge 8Programa festa major sabadell 2013 diumenge 8
Programa festa major sabadell 2013 diumenge 8
 
ECOGAS améliore sa relation fournisseurs grâce à la dématérialisation de ses ...
ECOGAS améliore sa relation fournisseurs grâce à la dématérialisation de ses ...ECOGAS améliore sa relation fournisseurs grâce à la dématérialisation de ses ...
ECOGAS améliore sa relation fournisseurs grâce à la dématérialisation de ses ...
 
Bambole Fatte A Mano
Bambole Fatte A ManoBambole Fatte A Mano
Bambole Fatte A Mano
 
Project planning form
Project planning formProject planning form
Project planning form
 
Learn about a Live WebShow Video Channel and Video email
Learn about a Live WebShow Video Channel and Video emailLearn about a Live WebShow Video Channel and Video email
Learn about a Live WebShow Video Channel and Video email
 
Vishnu Shanker's Portfolio
Vishnu Shanker's Portfolio Vishnu Shanker's Portfolio
Vishnu Shanker's Portfolio
 
Mi ct 30 ct-40 ct-50 - Servicio Tecnico Fagor
Mi ct 30 ct-40 ct-50 - Servicio Tecnico FagorMi ct 30 ct-40 ct-50 - Servicio Tecnico Fagor
Mi ct 30 ct-40 ct-50 - Servicio Tecnico Fagor
 
Security managers july 2015 (1)
Security managers july 2015 (1)Security managers july 2015 (1)
Security managers july 2015 (1)
 
Nuestro día D...NI OLVIDO NI PERDÓN
Nuestro día D...NI OLVIDO NI PERDÓNNuestro día D...NI OLVIDO NI PERDÓN
Nuestro día D...NI OLVIDO NI PERDÓN
 
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_IIIthermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
thermo fisher ED886123-7163-46F5-8387-5F57485F786B_FINAL09SHOW_III
 
Get Your Gamestorming On! Shift the Paradigm of Requirements Gathering
Get Your Gamestorming On! Shift the Paradigm of Requirements GatheringGet Your Gamestorming On! Shift the Paradigm of Requirements Gathering
Get Your Gamestorming On! Shift the Paradigm of Requirements Gathering
 
Socialoomph
SocialoomphSocialoomph
Socialoomph
 
Muri che parlano
Muri che parlano Muri che parlano
Muri che parlano
 
Los metrosexuales
Los metrosexualesLos metrosexuales
Los metrosexuales
 

More from Netskope

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of SecurityNetskope
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Netskope
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesNetskope
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlNetskope
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraNetskope
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPNetskope
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationNetskope
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report Netskope
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report Netskope
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365Netskope
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudNetskope
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipNetskope
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Netskope
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportNetskope
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Netskope
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudNetskope
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Netskope
 

More from Netskope (20)

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack Vector
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS Loopholes
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud Era
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCP
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud Report
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Cloud Security for Dummies Webinar

  • 1.
  • 2. Meet the Authors Ravi Ithal Chief Architect Krishna Narayanaswamy Chief Scientist Steve Malmskog Chief Network Architect Lebin Cheng VP, Application Engineering
  • 3. What We’ll Discuss • Short commercial break: Introducing Netskope • Cloud Security for Dummies – The 10 “Must Haves” • Finding and evaluating risk • Cloud security in practice • What makes a great cloud security policy
  • 4. Find, Understand, and Secure Cloud Apps for Safe Cloud Enablement • Real-time, granular control of any cloud app, sanctioned or not • Deep contextual visibility • Comprehensive end-point coverage and flexible deployment The Netskope Active Platform™
  • 5. Actual: 613 IT estimate: 40-50 88% cloud apps aren’t enterprise-ready Safely enable apps you already know about App Redundancy: • 67 Marketing • 43 Collaboration • 38 HR • 31 Finance • 28 Storage • 25 CRM Discover and control apps you don’t know about
  • 6. Data Activity App Identity Find Understand Secure IT-led Business-led User-led ServicesDeepContext Flexible Deployment Options Native Thick-client Apps Native Mobile Apps Browser-based Apps Remote users Control Sanctioned or Unsanctioned Apps Comprehensive End-point Coverage Agentless Reverse Proxy Thin Agent API Connectors Log Analysis SOC-1, SOC-2, Type I and II worldwide cloud On-premises secure appliance In-Line Deployment Options Out-of-Band Deployment Options
  • 7. Ten “Must Haves” for Safe Cloud Enablement 7 Discover apps and assess risk Segment apps sanctioned/unsanctioned Secure access to apps with SSO Audit activities user/admin/data Understand content to, from, and in apps Detect anomalies risky behavior, security threats Enforce granular policies in real-time, across any app Protect data in context who, what, where, activity, data Ensure compliance audit trails, remediation, reporting Coach users via conversations and automated
  • 8. © 2015 Netskope. All Rights Reserved. Best practices that were demonstrated in this webinar • Understand the risk in their organization • conduct forensics around stolen content • Set granular policies
  • 9. What Makes a Great Policy?
  • 11. © 2015 Netskope. All Rights Reserved. 11 App Introspection Inspection Secure content in the app, no matter when uploaded Secure content en route to or from the app
  • 13. Allow is the new block (allow is new block green light slide) 13
  • 14. © 2015 Netskope. All Rights Reserved. Thanks for Attending! Questions? 14 rithal@netskope.com, @ravi_ithal krishna@netskope.com, @Krishna_Nswamy lebinc@netskope.com, @LBCnetskope stevem@netskope.com sales@netskope.com, @Netskope

Editor's Notes

  1. DURING WELCOME
  2. In short, the Netskope Active Platform does three things: 1. Enables you to discover the cloud apps in your environment and understand their risk; 2. Gives you deep visibility into user activities in those apps, like who’s sharing, what are they sharing, and who are they sharing with; and 3. Gives you granular control at the activity- and data-level. So, for example, you can set a policy that says “Don’t let non-U.S. HR professionals download PII from any HR app to a mobile device.” It’s that precise and granular. The things that make us unique are that we provide our customers real-time, granular control over any app, not just your sanctioned ones; we give you visibility and control in context (who, what, when, where, and with whom); and we provide the broadest array of deployment options. Because we support those deployment options, it means we can support the broadest set of endpoints and use cases, now and in the future.
  3. However, for all of the cloud goodness that drives this adoption also comes tremendous cloud app sprawl. We at Netskope perform cloud assessments for our prospects and find that while IT usually estimates that they have about 40-50 apps running in their organizations (only a handful of which they manage), we discover more than 500. Beyond the sheer volume of apps, the number of apps in business-critical categories is surprising – 61 marketing, 39 HR, and 32 finance apps. And nearly 90% of those apps aren’t enterprise-ready, according to our Cloud Confidence Index. We see the challenge as this: safely enable the apps you roll out, and discover and get control over the ones you don’t know about.
  4. What this amounts to is the ability to provide these services on top of rich and granular context, provide them for any app, sanctioned or not, across an array of devices and access scenarios, and supporting any deployment depending on our customer’s use case.
  5. One framework we use to think about cloud apps starts with how those apps come into your environment, and whether they’re sanctioned or not. Some are brought in by IT, some by lines-of-business, and some by individuals. Each of these app types has an important, and often business-critical, role to play in the success of your organization. Even Twitter is a must-have for many organizations and not just in marketing, but in customer support, business development, and the executive team. We at Netskope have thought through how to safely enable apps, whether sanctioned or not, and regardless of how they come into your environment.
  6. Context is critical and you’d be surprised how deep an understanding you can get <click> Understand App risk Who is using the service and where they’re using it from Understand the devices that are being used to access these apps Understand the content and if it’s sensitive or not Get to know the types of activities that people are conducting in these apps. In the case of sharing, understand who they are sharing with.
  7. By giving you granular visibility and control with the Netskope Active Platform’s deep context, we help you take a scalpel to the problem by addressing risky behavior rather than blocking apps. This take on our customer Netflix’s series, Orange is the New Black, may seem like a silly quip, but it perfectly exemplifies the power of our platform – you can finally be in a position of “yes” rather than “no,” and be there safely.
  8. Rember, at the conclusion of our webinar, a window will open asking you to provide us with your mailing address for your hard copy of the book.