SlideShare a Scribd company logo
1 of 21
Data Privacy, Security, 
and Sovereignty 
in a Cloudy World
Speakers 
Jon Oltsik 
Senior Principal Analyst 
Enterprise Strategy Group 
Rajneesh Chopra 
VP, Product Management 
Netskope
Agenda 
1. Cloud computing plans 
2. Cloud computing and information security 
3. What’s Needed 
4. The Bigger Truth 
5. Q&A
Cloud Computing Plans
2014 IT Spending Change by Technology 
To the best of your knowledge, to what extent will your organization’s 2014 IT spending 
for each technology listed below change relative to 2013? (Percent of respondents) 
2014 spending will increase 2014 spending will stay flat 2014 spending will decrease 
52% 
52% 
49% 
48% 
47% 
46% 
46% 
43% 
41% 
Cloud computing services (N=276) 
Security (N=261) 
Virtualization/private cloud infrastructure software (N=197) 
Storage infrastructure (N=306) 
Network infrastructure (N=301) 
Business intelligence/analytics (N=187) 
Server infrastructure (N=337) 
Databases (N=282) 
Business applications (N=261) 
Infrastructure management software (N=178) 
Endpoint computing devices (N=175) 
© 2014 Netskope. All Rights Reserved. 
5 
40% 
72% 
62% 
31% 
38% 
45% 
38% 
44% 
41% 
46% 
46% 
48% 
31% 
39% 
21% 
6% 
7% 
9% 
17% 
14% 
7% 
15% 
10% 
14% 
12% 
13% 
12% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 
Information management software (N=168)
Usage of Cloud Computing Services 
Please indicate your organization’s usage of or plans for each of the following 
cloud computing services. (Percent of respondents, N=562) 
Currently use 
Do not currently use, but we have done so within the past two years 
Do not currently use but we plan to 
No use or plans at this time but we are interested 
No use, plans, or interest at this time 
33% 
© 2014 Netskope. All Rights Reserved. 
1% 
2% 
6 
27% 
63% 
10% 
12% 
23% 
21% 
17% 
15% 
18% 
9% 
17% 
20% 
10% 
2% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 
Software-as-a-service (SaaS) 
Infrastructure-as-a-service (IaaS) 
Platform-as-a-service (PaaS)
Most Important Considerations for IT 
Which of the following considerations do you believe will be most important in 
justifying IT investments to your organization’s business management team over 
the next 12 months? (Percent of respondents, N=562, three responses accepted) 
Return on investment 
Reduction in operational expenditures 
Business process improvement 
Improved security/risk management 
Reduction in capital expenditures 
Improved regulatory compliance 
Reduced time-to-market for our products or… 
© 2014 Netskope. All Rights Reserved. 
38% 
7 
20% 
19% 
18% 
26% 
31% 
37% 
37% 
0% 5% 10% 15% 20% 25% 30% 35% 40% 
Speed of payback
Applications Deployed via SaaS Model 
You have indicated that your organization is currently using software-as-a-service 
(SaaS). What specific applications has your organization currently deployed via a 
SaaS model? (Percent of respondents, N=354, multiple responses accepted) 
CRM (Customer Relationship Management) 
E-mail 
Collaboration/file sharing 
Industry-specific applications 
Internet/e-mail marketing 
Human resources 
Office productivity 
Business intelligence/analytics 
Project management 
Accounting/financial 
Content management/document management 
© 2014 Netskope. All Rights Reserved. 
8 
21% 
30% 
30% 
29% 
27% 
26% 
25% 
28% 
33% 
31% 
40% 
38% 
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 
Marketing automation
Cloud 
Computing 
and 
Information 
Security
Security Issues with IT Initiatives 
How has the introduction of the following technologies and policies altered security 
management and operations at your organization? (Percent of respondents, N=315) 
30% 
37% 
38% 
© 2014 Netskope. All Rights Reserved. 
6% 
2% 
4% 
10% 
2% 
10 
18% 
13% 
9% 
6% 
17% 
31% 
30% 
34% 
38% 
38% 
32% 
38% 
41% 
32% 
31% 
21% 
29% 
16% 
6% 
9% 
3% 
10% 
11% 
9% 
7% 
7% 
5% 
3% 
3% 
4% 
5% 
3% 
3% 
6% 
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 
Cloud computing 
Mobile devices 
Remote worker policies 
BYOD policies 
Server virtualization 
Web applications / SOA 
Desktop virtualization 
Made security management and operations much more difficult Made security management and operations somewhat more difficult 
Had no impact on security management and operations Made security management and operations somewhat easier 
Made security management and operations much easier Don’t know / Not applicable
Biggest IT Risks with Cloud Infrastructure 
Which of the following do you believe present the biggest IT risks in relation to the use of cloud 
infrastructure services? (Percent of respondents, N=229, multiple responses accepted) 
Lack of control over security operations directly related to IT… 
Privacy concerns associated with sensitive and/or regulated data… 
Lack of security visibility into cloud services infrastructure 
Security breach that compromises our cloud service providers’ … 
Poor security practices at a cloud service provider 
Risk of a network breach between internal networks and cloud… 
Employees may be using cloud-based infrastructure services that… 
Application-layer vulnerabilities within cloud infrastructure… 
Failing an IT or compliance audit 
Strategic cloud service provider financial problems 
© 2014 Netskope. All Rights Reserved. 
11 
16% 
16% 
19% 
22% 
21% 
27% 
26% 
29% 
28% 
31% 
33% 
0% 5% 10% 15% 20% 25% 30% 35% 
Rogue employee working at a cloud service provider
Understand company, customer, and 
employee data in context 
WHERE ARE THE DATA LOCATED? 
ARE THE DATA SENSITIVE? 
• Geo-residency visibility and 
policy enforcement 
• Block uploading to cloud apps where 
data are stored outside of geo 
• Prevent “sharing” outside of geo 
• In-depth DLP inspection 
• Understand 400+ file types 
• 3000+ unique data identifiers that 
include regional differences 
• Pre-defined PII, PCI, PHI profiles 
© 2014 Netskope. All Rights Reserved. 
12 
COMPANY, 
CUSTOMER, AND 
EMPLOYEE DATA
Encryption key management 
© 2014 Netskope. All Rights Reserved. 
13 
• Manage encryption keys in the 
cloud or on-premises 
• Netskope Active Encryption is 
FIPS 140-2, Level 3 security 
certified
Security Skills Shortage 
In which of the following areas of information security do you believe your IT organization currently has 
a problematic shortage of existing skills? (Percent of respondents, N=315, multiple responses accepted) 
Cloud/server virtualization security 
Endpoint/mobile device security 
Network security 
Data security 
Security analysis/forensics 
Emerging threat/malware expertise 
Application development security 
Security operations 
Email/messaging security 
Application/database security 
© 2014 Netskope. All Rights Reserved. 
14 
8% 
22% 
20% 
25% 
23% 
31% 
30% 
30% 
28% 
31% 
43% 
We do not currently have a problematic shortage of existing… 
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
What’s Needed? 
“As IT loses control, CISOs need to establish more control” 
Identity and data
What’s Needed? 
Discovery 
• Applications, users, activities, etc. 
Control 
• Alignment with security policies 
• Granularity, contextual policy enforcement 
Visibility 
• “Wide and Deep” 
• Analytics capabilities 
Detection and Response 
• Risk management 
• Alerting 
• Change management 
• Automation
Understand location of apps, users, and data traffic 
© 2014 Netskope. All Rights Reserved. 
17
The Bigger Truth 
Cloud computing momentum 
Security issues 
• People, processes, and technology 
• As IT loses control, CISOs must gain greater 
control of what they can 
Need for: 
• Discovery, continuous monitoring, situational 
awareness, risk management, and controls
Discovery Visibility 
Data 
Activity 
Granular 
Control 
ANY APP ANY DEVICE 
App 
Identity 
REAL-TIME & FLEXIBLE DEPLOYMENT 
Deep Context Services 
Netskope Active Platform
Where are your users? Where is the data? 
20
Allow is the new block (allow is new block green 
light slide) 
21

More Related Content

What's hot

Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Netskope
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeJoAnna Cheshire
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of SecurityNetskope
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudElasticsearch
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?Forcepoint LLC
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT InfrastructureScalar Decisions
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...DevOps.com
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report Netskope
 

What's hot (20)

Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic CloudTirez pleinement parti d'Elastic grâce à Elastic Cloud
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
 

Similar to Data Privacy, Security, and Sovereignty in a Cloudy World

Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Bitglass
 
Riverbed Software Defined IT Survey
Riverbed Software Defined IT SurveyRiverbed Software Defined IT Survey
Riverbed Software Defined IT SurveyRiverbed Technology
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathFadi Semaan
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...Radware
 
Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalMarc Musgrove
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
IoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesIoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesCloudera, Inc.
 
Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed Enterprise Management Associates
 
Improving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureEmulex Corporation
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index Insight
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Enterprise Management Associates
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...innoforum09
 

Similar to Data Privacy, Security, and Sovereignty in a Cloudy World (20)

Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
Riverbed Software Defined IT Survey
Riverbed Software Defined IT SurveyRiverbed Software Defined IT Survey
Riverbed Software Defined IT Survey
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...
 
Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 final
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
IoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesIoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use Cases
 
Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed Journey to the Software Defined Data Center: EMA Research Results Revealed
Journey to the Software Defined Data Center: EMA Research Results Revealed
 
Improving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT Infrastructure
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring Survey
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
 

More from Netskope

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Netskope
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesNetskope
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlNetskope
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraNetskope
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPNetskope
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report Netskope
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365Netskope
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportNetskope
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Netskope
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportNetskope
 
Summer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportSummer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportNetskope
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope
 

More from Netskope (15)

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack Vector
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS Loopholes
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud Era
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCP
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud Report
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 
Summer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportSummer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud Report
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Data Privacy, Security, and Sovereignty in a Cloudy World

  • 1. Data Privacy, Security, and Sovereignty in a Cloudy World
  • 2. Speakers Jon Oltsik Senior Principal Analyst Enterprise Strategy Group Rajneesh Chopra VP, Product Management Netskope
  • 3. Agenda 1. Cloud computing plans 2. Cloud computing and information security 3. What’s Needed 4. The Bigger Truth 5. Q&A
  • 5. 2014 IT Spending Change by Technology To the best of your knowledge, to what extent will your organization’s 2014 IT spending for each technology listed below change relative to 2013? (Percent of respondents) 2014 spending will increase 2014 spending will stay flat 2014 spending will decrease 52% 52% 49% 48% 47% 46% 46% 43% 41% Cloud computing services (N=276) Security (N=261) Virtualization/private cloud infrastructure software (N=197) Storage infrastructure (N=306) Network infrastructure (N=301) Business intelligence/analytics (N=187) Server infrastructure (N=337) Databases (N=282) Business applications (N=261) Infrastructure management software (N=178) Endpoint computing devices (N=175) © 2014 Netskope. All Rights Reserved. 5 40% 72% 62% 31% 38% 45% 38% 44% 41% 46% 46% 48% 31% 39% 21% 6% 7% 9% 17% 14% 7% 15% 10% 14% 12% 13% 12% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Information management software (N=168)
  • 6. Usage of Cloud Computing Services Please indicate your organization’s usage of or plans for each of the following cloud computing services. (Percent of respondents, N=562) Currently use Do not currently use, but we have done so within the past two years Do not currently use but we plan to No use or plans at this time but we are interested No use, plans, or interest at this time 33% © 2014 Netskope. All Rights Reserved. 1% 2% 6 27% 63% 10% 12% 23% 21% 17% 15% 18% 9% 17% 20% 10% 2% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Software-as-a-service (SaaS) Infrastructure-as-a-service (IaaS) Platform-as-a-service (PaaS)
  • 7. Most Important Considerations for IT Which of the following considerations do you believe will be most important in justifying IT investments to your organization’s business management team over the next 12 months? (Percent of respondents, N=562, three responses accepted) Return on investment Reduction in operational expenditures Business process improvement Improved security/risk management Reduction in capital expenditures Improved regulatory compliance Reduced time-to-market for our products or… © 2014 Netskope. All Rights Reserved. 38% 7 20% 19% 18% 26% 31% 37% 37% 0% 5% 10% 15% 20% 25% 30% 35% 40% Speed of payback
  • 8. Applications Deployed via SaaS Model You have indicated that your organization is currently using software-as-a-service (SaaS). What specific applications has your organization currently deployed via a SaaS model? (Percent of respondents, N=354, multiple responses accepted) CRM (Customer Relationship Management) E-mail Collaboration/file sharing Industry-specific applications Internet/e-mail marketing Human resources Office productivity Business intelligence/analytics Project management Accounting/financial Content management/document management © 2014 Netskope. All Rights Reserved. 8 21% 30% 30% 29% 27% 26% 25% 28% 33% 31% 40% 38% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Marketing automation
  • 9. Cloud Computing and Information Security
  • 10. Security Issues with IT Initiatives How has the introduction of the following technologies and policies altered security management and operations at your organization? (Percent of respondents, N=315) 30% 37% 38% © 2014 Netskope. All Rights Reserved. 6% 2% 4% 10% 2% 10 18% 13% 9% 6% 17% 31% 30% 34% 38% 38% 32% 38% 41% 32% 31% 21% 29% 16% 6% 9% 3% 10% 11% 9% 7% 7% 5% 3% 3% 4% 5% 3% 3% 6% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Cloud computing Mobile devices Remote worker policies BYOD policies Server virtualization Web applications / SOA Desktop virtualization Made security management and operations much more difficult Made security management and operations somewhat more difficult Had no impact on security management and operations Made security management and operations somewhat easier Made security management and operations much easier Don’t know / Not applicable
  • 11. Biggest IT Risks with Cloud Infrastructure Which of the following do you believe present the biggest IT risks in relation to the use of cloud infrastructure services? (Percent of respondents, N=229, multiple responses accepted) Lack of control over security operations directly related to IT… Privacy concerns associated with sensitive and/or regulated data… Lack of security visibility into cloud services infrastructure Security breach that compromises our cloud service providers’ … Poor security practices at a cloud service provider Risk of a network breach between internal networks and cloud… Employees may be using cloud-based infrastructure services that… Application-layer vulnerabilities within cloud infrastructure… Failing an IT or compliance audit Strategic cloud service provider financial problems © 2014 Netskope. All Rights Reserved. 11 16% 16% 19% 22% 21% 27% 26% 29% 28% 31% 33% 0% 5% 10% 15% 20% 25% 30% 35% Rogue employee working at a cloud service provider
  • 12. Understand company, customer, and employee data in context WHERE ARE THE DATA LOCATED? ARE THE DATA SENSITIVE? • Geo-residency visibility and policy enforcement • Block uploading to cloud apps where data are stored outside of geo • Prevent “sharing” outside of geo • In-depth DLP inspection • Understand 400+ file types • 3000+ unique data identifiers that include regional differences • Pre-defined PII, PCI, PHI profiles © 2014 Netskope. All Rights Reserved. 12 COMPANY, CUSTOMER, AND EMPLOYEE DATA
  • 13. Encryption key management © 2014 Netskope. All Rights Reserved. 13 • Manage encryption keys in the cloud or on-premises • Netskope Active Encryption is FIPS 140-2, Level 3 security certified
  • 14. Security Skills Shortage In which of the following areas of information security do you believe your IT organization currently has a problematic shortage of existing skills? (Percent of respondents, N=315, multiple responses accepted) Cloud/server virtualization security Endpoint/mobile device security Network security Data security Security analysis/forensics Emerging threat/malware expertise Application development security Security operations Email/messaging security Application/database security © 2014 Netskope. All Rights Reserved. 14 8% 22% 20% 25% 23% 31% 30% 30% 28% 31% 43% We do not currently have a problematic shortage of existing… 0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
  • 15. What’s Needed? “As IT loses control, CISOs need to establish more control” Identity and data
  • 16. What’s Needed? Discovery • Applications, users, activities, etc. Control • Alignment with security policies • Granularity, contextual policy enforcement Visibility • “Wide and Deep” • Analytics capabilities Detection and Response • Risk management • Alerting • Change management • Automation
  • 17. Understand location of apps, users, and data traffic © 2014 Netskope. All Rights Reserved. 17
  • 18. The Bigger Truth Cloud computing momentum Security issues • People, processes, and technology • As IT loses control, CISOs must gain greater control of what they can Need for: • Discovery, continuous monitoring, situational awareness, risk management, and controls
  • 19. Discovery Visibility Data Activity Granular Control ANY APP ANY DEVICE App Identity REAL-TIME & FLEXIBLE DEPLOYMENT Deep Context Services Netskope Active Platform
  • 20. Where are your users? Where is the data? 20
  • 21. Allow is the new block (allow is new block green light slide) 21

Editor's Notes

  1. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  2. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  3. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  4. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  5. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  6. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  7. Cloud computing is one of the most dramatic workplace shifts we’ve seen in decades. When we think about cloud app growth, it’s often about individuals’ usage of apps like Box and Dropbox. The reality is every line of business is adopting cloud apps, whether for HR, finance, supply chain, or business intelligence. Mobile, the other major crossover we’re seeing – with mobile devices and access surpassing that of PCs in virtually every measure – has fueled this shift. Cloud is no longer a question – it’s the way we do business.
  8. However, for all of the cloud goodness that drives this adoption also comes tremendous cloud app sprawl. We at Netskope perform cloud assessments for our prospects and find that while IT usually estimates that they have about 40-50 apps running in their organizations (only a handful of which they manage), we discover more than 500. Beyond the sheer volume of apps, the number of apps in business-critical categories is surprising – 61 marketing, 39 HR, and 32 finance apps. And nearly 90% of those apps aren’t enterprise-ready, according to our Cloud Confidence Index. We see the challenge as this: safely enable the apps you roll out, and discover and get control over the ones you don’t know about.
  9. However, for all of the cloud goodness that drives this adoption also comes tremendous cloud app sprawl. We at Netskope perform cloud assessments for our prospects and find that while IT usually estimates that they have about 40-50 apps running in their organizations (only a handful of which they manage), we discover more than 500. Beyond the sheer volume of apps, the number of apps in business-critical categories is surprising – 61 marketing, 39 HR, and 32 finance apps. And nearly 90% of those apps aren’t enterprise-ready, according to our Cloud Confidence Index. We see the challenge as this: safely enable the apps you roll out, and discover and get control over the ones you don’t know about.
  10. However, for all of the cloud goodness that drives this adoption also comes tremendous cloud app sprawl. We at Netskope perform cloud assessments for our prospects and find that while IT usually estimates that they have about 40-50 apps running in their organizations (only a handful of which they manage), we discover more than 500. Beyond the sheer volume of apps, the number of apps in business-critical categories is surprising – 61 marketing, 39 HR, and 32 finance apps. And nearly 90% of those apps aren’t enterprise-ready, according to our Cloud Confidence Index. We see the challenge as this: safely enable the apps you roll out, and discover and get control over the ones you don’t know about.
  11. What makes Netskope unique? We developed our solution with three core assumptions in mind. The first is we assumed that IT wouldn’t always manage the app. Unlike other solutions that may provide analytics and policy enforcement for apps that IT manages, they don’t do those things for any app, including unmanaged ones. This is important because, for example, if you set a policy against the upload of ePHI to cloud storage, you want to enforce it across the board, not just for the apps you manage or even know about. Second, we assumed that users would be anywhere, on premises or on mobile devices. We architected the solution to support both on-premises and remote devices, PC and mobile, and web-based or native apps. So whether your user is accessing an app via the web at work or via the mobile version of that app via at Starbucks, you will have visibility and control over that usage. Third, we assumed that beyond gaining visibility, IT would want the option to assert some control over cloud usage. This prompted us to provide the ability to enforce policies across any app, in real-time. These three core assumptions are the basis for our philosophy and capabilities are unique to our solution and architecture.
  12. Allow is the new block. This is something that Netskope talks about a lot and I think it’s a good way to think about it. Thank you very much for your time and attention today -- I hope you enjoy the rest of the meeting and find me after if you have any questions.