SlideShare a Scribd company logo
1 of 21
Data Privacy, Security, 
and Sovereignty 
in a Cloudy World
Speakers 
Jon Oltsik 
Senior Principal Analyst 
Enterprise Strategy Group 
Rajneesh Chopra 
VP, Product Management 
Netskope
Agenda 
1. Cloud computing plans 
2. Cloud computing and information security 
3. What’s Needed 
4. The Bigger Truth 
5. Q&A
Cloud Computing Plans
2014 IT Spending Change by Technology 
To the best of your knowledge, to what extent will your organization’s 2014 IT spending 
for each technology listed below change relative to 2013? (Percent of respondents) 
2014 spending will increase 2014 spending will stay flat 2014 spending will decrease 
52% 
52% 
49% 
48% 
47% 
46% 
46% 
43% 
41% 
Cloud computing services (N=276) 
Security (N=261) 
Virtualization/private cloud infrastructure software (N=197) 
Storage infrastructure (N=306) 
Network infrastructure (N=301) 
Business intelligence/analytics (N=187) 
Server infrastructure (N=337) 
Databases (N=282) 
Business applications (N=261) 
Infrastructure management software (N=178) 
Endpoint computing devices (N=175) 
© 2014 Netskope. All Rights Reserved. 
5 
40% 
72% 
62% 
31% 
38% 
45% 
38% 
44% 
41% 
46% 
46% 
48% 
31% 
39% 
21% 
6% 
7% 
9% 
17% 
14% 
7% 
15% 
10% 
14% 
12% 
13% 
12% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 
Information management software (N=168)
Usage of Cloud Computing Services 
Please indicate your organization’s usage of or plans for each of the following 
cloud computing services. (Percent of respondents, N=562) 
Currently use 
Do not currently use, but we have done so within the past two years 
Do not currently use but we plan to 
No use or plans at this time but we are interested 
No use, plans, or interest at this time 
33% 
© 2014 Netskope. All Rights Reserved. 
1% 
2% 
6 
27% 
63% 
10% 
12% 
23% 
21% 
17% 
15% 
18% 
9% 
17% 
20% 
10% 
2% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 
Software-as-a-service (SaaS) 
Infrastructure-as-a-service (IaaS) 
Platform-as-a-service (PaaS)
Most Important Considerations for IT 
Which of the following considerations do you believe will be most important in 
justifying IT investments to your organization’s business management team over 
the next 12 months? (Percent of respondents, N=562, three responses accepted) 
Return on investment 
Reduction in operational expenditures 
Business process improvement 
Improved security/risk management 
Reduction in capital expenditures 
Improved regulatory compliance 
Reduced time-to-market for our products or… 
© 2014 Netskope. All Rights Reserved. 
38% 
7 
20% 
19% 
18% 
26% 
31% 
37% 
37% 
0% 5% 10% 15% 20% 25% 30% 35% 40% 
Speed of payback
Applications Deployed via SaaS Model 
You have indicated that your organization is currently using software-as-a-service 
(SaaS). What specific applications has your organization currently deployed via a 
SaaS model? (Percent of respondents, N=354, multiple responses accepted) 
CRM (Customer Relationship Management) 
E-mail 
Collaboration/file sharing 
Industry-specific applications 
Internet/e-mail marketing 
Human resources 
Office productivity 
Business intelligence/analytics 
Project management 
Accounting/financial 
Content management/document management 
© 2014 Netskope. All Rights Reserved. 
8 
21% 
30% 
30% 
29% 
27% 
26% 
25% 
28% 
33% 
31% 
40% 
38% 
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 
Marketing automation
Cloud 
Computing 
and 
Information 
Security
Security Issues with IT Initiatives 
How has the introduction of the following technologies and policies altered security 
management and operations at your organization? (Percent of respondents, N=315) 
30% 
37% 
38% 
© 2014 Netskope. All Rights Reserved. 
6% 
2% 
4% 
10% 
2% 
10 
18% 
13% 
9% 
6% 
17% 
31% 
30% 
34% 
38% 
38% 
32% 
38% 
41% 
32% 
31% 
21% 
29% 
16% 
6% 
9% 
3% 
10% 
11% 
9% 
7% 
7% 
5% 
3% 
3% 
4% 
5% 
3% 
3% 
6% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 
Cloud computing 
Mobile devices 
Remote worker policies 
BYOD policies 
Server virtualization 
Web applications / SOA 
Desktop virtualization 
Made security management and operations much more difficult Made security management and operations somewhat more difficult 
Had no impact on security management and operations Made security management and operations somewhat easier 
Made security management and operations much easier Don’t know / Not applicable
Biggest IT Risks with Cloud Infrastructure 
Which of the following do you believe present the biggest IT risks in relation to the use of cloud 
infrastructure services? (Percent of respondents, N=229, multiple responses accepted) 
Lack of control over security operations directly related to IT… 
Privacy concerns associated with sensitive and/or regulated data… 
Lack of security visibility into cloud services infrastructure 
Security breach that compromises our cloud service providers’ … 
Poor security practices at a cloud service provider 
Risk of a network breach between internal networks and cloud… 
Employees may be using cloud-based infrastructure services that… 
Application-layer vulnerabilities within cloud infrastructure… 
Failing an IT or compliance audit 
Strategic cloud service provider financial problems 
© 2014 Netskope. All Rights Reserved. 
11 
16% 
16% 
19% 
22% 
21% 
27% 
26% 
29% 
28% 
31% 
33% 
0% 5% 10% 15% 20% 25% 30% 35% 
Rogue employee working at a cloud service provider
Understand company, customer, and 
employee data in context 
WHERE ARE THE DATA LOCATED? 
ARE THE DATA SENSITIVE? 
• Geo-residency visibility and 
policy enforcement 
• Block uploading to cloud apps where 
data are stored outside of geo 
• Prevent “sharing” outside of geo 
• In-depth DLP inspection 
• Understand 400+ file types 
• 3000+ unique data identifiers that 
include regional differences 
• Pre-defined PII, PCI, PHI profiles 
© 2014 Netskope. All Rights Reserved. 
12 
COMPANY, 
CUSTOMER, AND 
EMPLOYEE DATA
Encryption key management 
© 2014 Netskope. All Rights Reserved. 
13 
• Manage encryption keys in the 
cloud or on-premises 
• Netskope Active Encryption is 
FIPS 140-2, Level 3 security 
certified
Security Skills Shortage 
In which of the following areas of information security do you believe your IT organization currently has 
a problematic shortage of existing skills? (Percent of respondents, N=315, multiple responses accepted) 
Cloud/server virtualization security 
Endpoint/mobile device security 
Network security 
Data security 
Security analysis/forensics 
Emerging threat/malware expertise 
Application development security 
Security operations 
Email/messaging security 
Application/database security 
© 2014 Netskope. All Rights Reserved. 
14 
8% 
22% 
20% 
25% 
23% 
31% 
30% 
30% 
28% 
31% 
43% 
We do not currently have a problematic shortage of existing… 
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
What’s Needed? 
“As IT loses control, CISOs need to establish more control” 
Identity and data
What’s Needed? 
Discovery 
• Applications, users, activities, etc. 
Control 
• Alignment with security policies 
• Granularity, contextual policy enforcement 
Visibility 
• “Wide and Deep” 
• Analytics capabilities 
Detection and Response 
• Risk management 
• Alerting 
• Change management 
• Automation
Understand location of apps, users, and data traffic 
© 2014 Netskope. All Rights Reserved. 
17
The Bigger Truth 
Cloud computing momentum 
Security issues 
• People, processes, and technology 
• As IT loses control, CISOs must gain greater 
control of what they can 
Need for: 
• Discovery, continuous monitoring, situational 
awareness, risk management, and controls
Discovery Visibility 
Data 
Activity 
Granular 
Control 
ANY APP ANY DEVICE 
App 
Identity 
REAL-TIME & FLEXIBLE DEPLOYMENT 
Deep Context Services 
Netskope Active Platform
Where are your users? Where is the data? 
20
Allow is the new block (allow is new block green 
light slide) 
21

More Related Content

What's hot

Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Netskope
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeJoAnna Cheshire
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of SecurityNetskope
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudElasticsearch
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?Forcepoint LLC
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT InfrastructureScalar Decisions
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report Netskope
 

What's hot (20)

Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
 

Similar to Data Privacy, Security, and Sovereignty in a Cloudy World

Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Bitglass
 
Riverbed Software Defined IT Survey
Riverbed Software Defined IT SurveyRiverbed Software Defined IT Survey
Riverbed Software Defined IT SurveyRiverbed Technology
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathFadi Semaan
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...Radware
 
Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalMarc Musgrove
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
IoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesIoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesCloudera, Inc.
 
Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed Enterprise Management Associates
 
Improving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureEmulex Corporation
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index Insight
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Enterprise Management Associates
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...innoforum09
 

Similar to Data Privacy, Security, and Sovereignty in a Cloudy World (20)

Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
Riverbed Software Defined IT Survey
Riverbed Software Defined IT SurveyRiverbed Software Defined IT Survey
Riverbed Software Defined IT Survey
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...
 
Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 final
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
IoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesIoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use Cases
 
Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed
 
Improving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT Infrastructure
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring Survey
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
 

More from Netskope

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Netskope
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesNetskope
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlNetskope
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraNetskope
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPNetskope
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report Netskope
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365Netskope
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportNetskope
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Netskope
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportNetskope
 
Summer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportSummer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportNetskope
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope
 

More from Netskope (15)

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack Vector
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS Loopholes
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud Era
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCP
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud Report
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 
Summer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportSummer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud Report
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 

Data Privacy, Security, and Sovereignty in a Cloudy World

  • 1. Data Privacy, Security, and Sovereignty in a Cloudy World
  • 2. Speakers Jon Oltsik Senior Principal Analyst Enterprise Strategy Group Rajneesh Chopra VP, Product Management Netskope
  • 3. Agenda 1. Cloud computing plans 2. Cloud computing and information security 3. What’s Needed 4. The Bigger Truth 5. Q&A
  • 5. 2014 IT Spending Change by Technology To the best of your knowledge, to what extent will your organization’s 2014 IT spending for each technology listed below change relative to 2013? (Percent of respondents) 2014 spending will increase 2014 spending will stay flat 2014 spending will decrease 52% 52% 49% 48% 47% 46% 46% 43% 41% Cloud computing services (N=276) Security (N=261) Virtualization/private cloud infrastructure software (N=197) Storage infrastructure (N=306) Network infrastructure (N=301) Business intelligence/analytics (N=187) Server infrastructure (N=337) Databases (N=282) Business applications (N=261) Infrastructure management software (N=178) Endpoint computing devices (N=175) © 2014 Netskope. All Rights Reserved. 5 40% 72% 62% 31% 38% 45% 38% 44% 41% 46% 46% 48% 31% 39% 21% 6% 7% 9% 17% 14% 7% 15% 10% 14% 12% 13% 12% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Information management software (N=168)
  • 6. Usage of Cloud Computing Services Please indicate your organization’s usage of or plans for each of the following cloud computing services. (Percent of respondents, N=562) Currently use Do not currently use, but we have done so within the past two years Do not currently use but we plan to No use or plans at this time but we are interested No use, plans, or interest at this time 33% © 2014 Netskope. All Rights Reserved. 1% 2% 6 27% 63% 10% 12% 23% 21% 17% 15% 18% 9% 17% 20% 10% 2% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Software-as-a-service (SaaS) Infrastructure-as-a-service (IaaS) Platform-as-a-service (PaaS)
  • 7. Most Important Considerations for IT Which of the following considerations do you believe will be most important in justifying IT investments to your organization’s business management team over the next 12 months? (Percent of respondents, N=562, three responses accepted) Return on investment Reduction in operational expenditures Business process improvement Improved security/risk management Reduction in capital expenditures Improved regulatory compliance Reduced time-to-market for our products or… © 2014 Netskope. All Rights Reserved. 38% 7 20% 19% 18% 26% 31% 37% 37% 0% 5% 10% 15% 20% 25% 30% 35% 40% Speed of payback
  • 8. Applications Deployed via SaaS Model You have indicated that your organization is currently using software-as-a-service (SaaS). What specific applications has your organization currently deployed via a SaaS model? (Percent of respondents, N=354, multiple responses accepted) CRM (Customer Relationship Management) E-mail Collaboration/file sharing Industry-specific applications Internet/e-mail marketing Human resources Office productivity Business intelligence/analytics Project management Accounting/financial Content management/document management © 2014 Netskope. All Rights Reserved. 8 21% 30% 30% 29% 27% 26% 25% 28% 33% 31% 40% 38% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Marketing automation
  • 9. Cloud Computing and Information Security
  • 10. Security Issues with IT Initiatives How has the introduction of the following technologies and policies altered security management and operations at your organization? (Percent of respondents, N=315) 30% 37% 38% © 2014 Netskope. All Rights Reserved. 6% 2% 4% 10% 2% 10 18% 13% 9% 6% 17% 31% 30% 34% 38% 38% 32% 38% 41% 32% 31% 21% 29% 16% 6% 9% 3% 10% 11% 9% 7% 7% 5% 3% 3% 4% 5% 3% 3% 6% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Cloud computing Mobile devices Remote worker policies BYOD policies Server virtualization Web applications / SOA Desktop virtualization Made security management and operations much more difficult Made security management and operations somewhat more difficult Had no impact on security management and operations Made security management and operations somewhat easier Made security management and operations much easier Don’t know / Not applicable
  • 11. Biggest IT Risks with Cloud Infrastructure Which of the following do you believe present the biggest IT risks in relation to the use of cloud infrastructure services? (Percent of respondents, N=229, multiple responses accepted) Lack of control over security operations directly related to IT… Privacy concerns associated with sensitive and/or regulated data… Lack of security visibility into cloud services infrastructure Security breach that compromises our cloud service providers’ … Poor security practices at a cloud service provider Risk of a network breach between internal networks and cloud… Employees may be using cloud-based infrastructure services that… Application-layer vulnerabilities within cloud infrastructure… Failing an IT or compliance audit Strategic cloud service provider financial problems © 2014 Netskope. All Rights Reserved. 11 16% 16% 19% 22% 21% 27% 26% 29% 28% 31% 33% 0% 5% 10% 15% 20% 25% 30% 35% Rogue employee working at a cloud service provider
  • 12. Understand company, customer, and employee data in context WHERE ARE THE DATA LOCATED? ARE THE DATA SENSITIVE? • Geo-residency visibility and policy enforcement • Block uploading to cloud apps where data are stored outside of geo • Prevent “sharing” outside of geo • In-depth DLP inspection • Understand 400+ file types • 3000+ unique data identifiers that include regional differences • Pre-defined PII, PCI, PHI profiles © 2014 Netskope. All Rights Reserved. 12 COMPANY, CUSTOMER, AND EMPLOYEE DATA
  • 13. Encryption key management © 2014 Netskope. All Rights Reserved. 13 • Manage encryption keys in the cloud or on-premises • Netskope Active Encryption is FIPS 140-2, Level 3 security certified
  • 14. Security Skills Shortage In which of the following areas of information security do you believe your IT organization currently has a problematic shortage of existing skills? (Percent of respondents, N=315, multiple responses accepted) Cloud/server virtualization security Endpoint/mobile device security Network security Data security Security analysis/forensics Emerging threat/malware expertise Application development security Security operations Email/messaging security Application/database security © 2014 Netskope. All Rights Reserved. 14 8% 22% 20% 25% 23% 31% 30% 30% 28% 31% 43% We do not currently have a problematic shortage of existing… 0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
  • 15. What’s Needed? “As IT loses control, CISOs need to establish more control” Identity and data
  • 16. What’s Needed? Discovery • Applications, users, activities, etc. Control • Alignment with security policies • Granularity, contextual policy enforcement Visibility • “Wide and Deep” • Analytics capabilities Detection and Response • Risk management • Alerting • Change management • Automation
  • 17. Understand location of apps, users, and data traffic © 2014 Netskope. All Rights Reserved. 17
  • 18. The Bigger Truth Cloud computing momentum Security issues • People, processes, and technology • As IT loses control, CISOs must gain greater control of what they can Need for: • Discovery, continuous monitoring, situational awareness, risk management, and controls
  • 19. Discovery Visibility Data Activity Granular Control ANY APP ANY DEVICE App Identity REAL-TIME & FLEXIBLE DEPLOYMENT Deep Context Services Netskope Active Platform
  • 20. Where are your users? Where is the data? 20
  • 21. Allow is the new block (allow is new block green light slide) 21

Editor's Notes

  1. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  2. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  3. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  4. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  5. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  6. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  7. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  8. However, for all of the cloud goodness that drives this adoption also comes tremendous cloud app sprawl. We at Netskope perform cloud assessments for our prospects and find that while IT usually estimates that they have about 40-50 apps running in their organizations (only a handful of which they manage), we discover more than 500. Beyond the sheer volume of apps, the number of apps in business-critical categories is surprising – 61 marketing, 39 HR, and 32 finance apps. And nearly 90% of those apps aren’t enterprise-ready, according to our Cloud Confidence Index. We see the challenge as this: safely enable the apps you roll out, and discover and get control over the ones you don’t know about.
  9. However, for all of the cloud goodness that drives this adoption also comes tremendous cloud app sprawl. We at Netskope perform cloud assessments for our prospects and find that while IT usually estimates that they have about 40-50 apps running in their organizations (only a handful of which they manage), we discover more than 500. Beyond the sheer volume of apps, the number of apps in business-critical categories is surprising – 61 marketing, 39 HR, and 32 finance apps. And nearly 90% of those apps aren’t enterprise-ready, according to our Cloud Confidence Index. We see the challenge as this: safely enable the apps you roll out, and discover and get control over the ones you don’t know about.
  10. However, for all of the cloud goodness that drives this adoption also comes tremendous cloud app sprawl. We at Netskope perform cloud assessments for our prospects and find that while IT usually estimates that they have about 40-50 apps running in their organizations (only a handful of which they manage), we discover more than 500. Beyond the sheer volume of apps, the number of apps in business-critical categories is surprising – 61 marketing, 39 HR, and 32 finance apps. And nearly 90% of those apps aren’t enterprise-ready, according to our Cloud Confidence Index. We see the challenge as this: safely enable the apps you roll out, and discover and get control over the ones you don’t know about.
  11. What makes Netskope unique? We developed our solution with three core assumptions in mind. The first is we assumed that IT wouldn’t always manage the app. Unlike other solutions that may provide analytics and policy enforcement for apps that IT manages, they don’t do those things for any app, including unmanaged ones. This is important because, for example, if you set a policy against the upload of ePHI to cloud storage, you want to enforce it across the board, not just for the apps you manage or even know about. Second, we assumed that users would be anywhere, on premises or on mobile devices. We architected the solution to support both on-premises and remote devices, PC and mobile, and web-based or native apps. So whether your user is accessing an app via the web at work or via the mobile version of that app via at Starbucks, you will have visibility and control over that usage. Third, we assumed that beyond gaining visibility, IT would want the option to assert some control over cloud usage. This prompted us to provide the ability to enforce policies across any app, in real-time. These three core assumptions are the basis for our philosophy and capabilities are unique to our solution and architecture.
  12. Allow is the new block. This is something that Netskope talks about a lot and I think it’s a good way to think about it. Thank you very much for your time and attention today -- I hope you enjoy the rest of the meeting and find me after if you have any questions.