SlideShare a Scribd company logo
1 of 11
NG CASB Update
Partner Webinar
Bill Marcus
Chris Mitchell
September 2022
v
v
2 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
2 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
EXISTING APPROACHES FAIL TO ADDRESS THESE NEW CHALLENGES
v
v
3 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
SECURE
THE APPS
Secure sanctioned SaaS
from dangerous
misconfigurations
PROTECT
THE DATA
Protect data everywhere,
including modern
collaboration apps
Inspect all content and user
activity to stop attackers
and malicious insiders
PREVENT
ATTACKS
MONITOR ALL
SAAS USAGE
Continuously discover
and control all SaaS
consumption
3 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
SECURING MODERN SAAS REQUIRES A ZERO TRUST APPROACH
v
v
4 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
4 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
VISIBILITY AND CONTROL OF ALL SAAS USAGE
Gain visibility into all SaaS consumption
across the enterprise and reduce the
risk of shadow IT
● Continuous app discovery and
classification with visibility into more than
45K SaaS apps and 35+ app attributes
● Automated discovery of new SaaS apps
based on ML and crowdsourced
intelligence
● Control shadow IT and user activity with
automated SaaS policy recommendations
● Prevent sensitive data loss with Enterprise
DLP capabilities, including EDM, OCR, ML,
and NLP
v
v
5 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
5 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
COMPREHENSIVE SAAS SECURITY POSTURE MANAGEMENT
Protect your essential SaaS apps
from dangerous misconfigurations that
put users and data at risk
● Industry-leading app coverage with
automated benchmarking against security
best practices for over 40+ apps
(Targeting 100 apps by end of 2022)
● Security that goes beyond compliance with
comprehensive best practices for all
configurations that impact app security
● Prevention-first approach with single-click
remediation and drift prevention to prevent
problems before they occur
v
v
6 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
6 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
DATA SECURITY BUILT FOR MODERN SAAS
Prevent exposure of sensitive data within SaaS
apps, including secrets commonly shared within
collaboration apps
● Industry-leading app coverage with over 27+ API
integrations, including collaboration apps like Slack,
Teams, and Zoom
● Best-in-class data detection with EDM, OCR, 1000s
of built-in patterns, and ML/NLP classifiers
● Natural language processing (NLP) finds hard-to-
detect secrets such as passwords and API keys in
unstructured chat data
● Reduce workload on security teams by alerting end
users to data incidents in real time with user-led
remediation
v
v
7 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
7 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
PROTECTION FROM ADVANCED ATTACKS
Stop evasive malware, compromised
accounts and malicious insiders before
the damage is done
● Native integration with WildFire stops
advanced and targeted malware hidden
inside of SaaS apps
● Detects suspicious user activities
associated with compromised accounts and
malicious insiders
● Behavioral analytics identifies high-risk
activities including shared credentials, bulk
data access, suspicious logins, and more
● User activity auditing enables quick
investigation and remediation workflows
8 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
v
v
Natively Integrated Next-Generation CASB (New UX)
Single Console
SASE w/NG CASB
v
v
9 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
9 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information.
NEXT-GENERATION CASB
PART OF THE THE INDUSTRY’S MOST COMPLETE SASE SOLUTION
1000’s
of Users
Home User
Mobile User
Branch
1000’s
of SAAS Apps
Enterprise SaaS • Shadow IT
Partner Apps • Personal Apps
CONTINUOUS
SECURITY
INSPECTION
CONTINUOUS
TRUST
VERIFICATION
User-ID
Device-ID App-ID
NG
CASB
VISIBILITY AND
CONTROL OF ALL
SAAS USAGE
COMPREHENSIVE SAAS
SECURITY POSTURE
MANAGEMENT
DATA SECURITY BUILT
FOR MODERN SAAS
PROTECTION FROM
ADVANCED THREATS
NG
CASB
Advanced SaaS Security
Large Automotive Supplier with
190K Employees Globally
10
PROJECT DRIVERS
● Massive cloud/SaaS
adoption
● Visibility and control
over known and
unknown apps
● Reduce complexity;
consolidate security
IMPACT
● Cloud-delivered security
simplified deployment
and policy creation
● Dramatically increased
visibility and control of
all apps
● Consistent protections
for 190K users globally
Q&A

More Related Content

Similar to ng-casb-sales-enablement-webinar.pptx

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdfThousandEyes
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPOlivia LaMar
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Amazon Web Services
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
HK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - finalHK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - finalJuni Yan
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerZscaler
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
Compliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient MeshCompliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient MeshChristian Posta
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
A10 interopjp keynote final-2
A10 interopjp keynote final-2A10 interopjp keynote final-2
A10 interopjp keynote final-2Sanjay Kapoor
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesThousandEyes
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 

Similar to ng-casb-sales-enablement-webinar.pptx (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
HK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - finalHK VForum F5 apps centric security nov 4, 2016 - final
HK VForum F5 apps centric security nov 4, 2016 - final
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Compliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient MeshCompliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient Mesh
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
A10 interopjp keynote final-2
A10 interopjp keynote final-2A10 interopjp keynote final-2
A10 interopjp keynote final-2
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

ng-casb-sales-enablement-webinar.pptx

  • 1. NG CASB Update Partner Webinar Bill Marcus Chris Mitchell September 2022
  • 2. v v 2 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. 2 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. EXISTING APPROACHES FAIL TO ADDRESS THESE NEW CHALLENGES
  • 3. v v 3 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. SECURE THE APPS Secure sanctioned SaaS from dangerous misconfigurations PROTECT THE DATA Protect data everywhere, including modern collaboration apps Inspect all content and user activity to stop attackers and malicious insiders PREVENT ATTACKS MONITOR ALL SAAS USAGE Continuously discover and control all SaaS consumption 3 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. SECURING MODERN SAAS REQUIRES A ZERO TRUST APPROACH
  • 4. v v 4 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. 4 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. VISIBILITY AND CONTROL OF ALL SAAS USAGE Gain visibility into all SaaS consumption across the enterprise and reduce the risk of shadow IT ● Continuous app discovery and classification with visibility into more than 45K SaaS apps and 35+ app attributes ● Automated discovery of new SaaS apps based on ML and crowdsourced intelligence ● Control shadow IT and user activity with automated SaaS policy recommendations ● Prevent sensitive data loss with Enterprise DLP capabilities, including EDM, OCR, ML, and NLP
  • 5. v v 5 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. 5 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. COMPREHENSIVE SAAS SECURITY POSTURE MANAGEMENT Protect your essential SaaS apps from dangerous misconfigurations that put users and data at risk ● Industry-leading app coverage with automated benchmarking against security best practices for over 40+ apps (Targeting 100 apps by end of 2022) ● Security that goes beyond compliance with comprehensive best practices for all configurations that impact app security ● Prevention-first approach with single-click remediation and drift prevention to prevent problems before they occur
  • 6. v v 6 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. 6 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. DATA SECURITY BUILT FOR MODERN SAAS Prevent exposure of sensitive data within SaaS apps, including secrets commonly shared within collaboration apps ● Industry-leading app coverage with over 27+ API integrations, including collaboration apps like Slack, Teams, and Zoom ● Best-in-class data detection with EDM, OCR, 1000s of built-in patterns, and ML/NLP classifiers ● Natural language processing (NLP) finds hard-to- detect secrets such as passwords and API keys in unstructured chat data ● Reduce workload on security teams by alerting end users to data incidents in real time with user-led remediation
  • 7. v v 7 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. 7 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. PROTECTION FROM ADVANCED ATTACKS Stop evasive malware, compromised accounts and malicious insiders before the damage is done ● Native integration with WildFire stops advanced and targeted malware hidden inside of SaaS apps ● Detects suspicious user activities associated with compromised accounts and malicious insiders ● Behavioral analytics identifies high-risk activities including shared credentials, bulk data access, suspicious logins, and more ● User activity auditing enables quick investigation and remediation workflows
  • 8. 8 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. v v Natively Integrated Next-Generation CASB (New UX) Single Console SASE w/NG CASB
  • 9. v v 9 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. 9 | © 2022 Palo Alto Networks, Inc. All rights reserved. Proprietary and confidential information. NEXT-GENERATION CASB PART OF THE THE INDUSTRY’S MOST COMPLETE SASE SOLUTION 1000’s of Users Home User Mobile User Branch 1000’s of SAAS Apps Enterprise SaaS • Shadow IT Partner Apps • Personal Apps CONTINUOUS SECURITY INSPECTION CONTINUOUS TRUST VERIFICATION User-ID Device-ID App-ID NG CASB VISIBILITY AND CONTROL OF ALL SAAS USAGE COMPREHENSIVE SAAS SECURITY POSTURE MANAGEMENT DATA SECURITY BUILT FOR MODERN SAAS PROTECTION FROM ADVANCED THREATS NG CASB
  • 10. Advanced SaaS Security Large Automotive Supplier with 190K Employees Globally 10 PROJECT DRIVERS ● Massive cloud/SaaS adoption ● Visibility and control over known and unknown apps ● Reduce complexity; consolidate security IMPACT ● Cloud-delivered security simplified deployment and policy creation ● Dramatically increased visibility and control of all apps ● Consistent protections for 190K users globally
  • 11. Q&A

Editor's Notes

  1. That certainly sounds like a significant set of security challenges, but the entire CASB industry was born to solve SaaS security for us. Yet these security problems remain. So what went wrong? Well, traditional CASB tried to solve data security first with an instrument called data loss prevention, or DLP, which attempts to identify and control the movement and access of sensitive data. The problem is that this approach skips over the bulk of the SaaS attack surface — which is the security and integrity of the SaaS app itself. If you focus on data security while neglecting the security posture of the app, it’s like building on a cracked foundation. If you can’t trust that the app itself is hardened from attack, then the app can’t be relied on to provide any security assurances, including data security. Second, when it comes to data security, traditional CASB products more-or-less took legacy approaches to DLP and bolted these engines onto SaaS. The problem is that the nature of the data itself and how it is shared has changed. We’re no longer just talking about files and databases anymore, we’re talking about sensitive data being shared in real time within unstructured chat conversations through collaboration apps. Legacy DLP just doesn’t work in this model. Third, most CASB vendors simply have not made the investments required, nor do they have the security pedigree, to deliver best-in-class anti-malware and other threat defense technology, and commodity capabilities and OEM technology just doesn’t have what it takes to detect and stop modern attackers from getting through.
  2. Well, it became clear to us that we needed to take a zero trust-based approach to SaaS security. Just as we pioneered the industry’s only ZTNA 2.0 approach to SASE, we can see that the same principles of ZTNA 2.0 apply to securing SaaS specifically. In fact, since CASB is so tightly woven in SASE, it truly serves as another policy decision and enforcement point in the ZTNA construct. It has the power to allow or deny sessions just as other SASE functions do, and that’s congruent with a key goal of ZTNA, which is moving to session trust. There are four must-have components to taking a zero-trust approach to securing SaaS. First, visibility and control over all SaaS consumption across the enterprise is the only way to effectively implement least privilege access for SaaS. You cannot secure what you cannot see. Second, you need to be able to secure the SaaS apps themselves if you’re going to successfully prevent a breach. With zero trust, you cannot assume that SaaS apps are “secure by default,” because often they are not. Third, you also need to protect all data — which includes modern forms of data, wherever they may be found, such as in modern collaboration apps Fourth, in order to prevent attacks, you can’t assume that authenticated users are who they say they are, or that they are well-intentioned. Zero trust requires that you can’t assume a file inside your SaaS app is benign. Continuous inspection of all objects and user activities in SaaS is required to truly implement a zero-trust approach for SaaS.
  3. Not too long ago, we introduced the Application Cloud Engine, which uses cloud-based ML and near-real-time SaaS consumption telemetry from users to automatically discover, identify, and catalog new SaaS apps. We knew it was the only way to keep up with the incredible pace of SaaS, and it was well worth the investment, as our SaaS app catalog has now swelled past 40k apps and is growing by the day. This provides an amazing level of visibility and control of all SaaS consumption across the enterprise, enabling security teams to smartly reduce risk through automated policy recommendations, which include access controls, WildFire for antimalware, and DLP, all of which help mitigate risk while not slowing down the business. You can now actually manage Next-gen CASB directly from the Prisma Access cloud-based management console, which provides a fully unified user experience.
  4. Next, we’re introducing a completely new product within next-gen CASB called SaaS Security Posture Management (or SSPM) to harden your sanctioned enterprise SaaS applications and protect them from attack. Our focus here is on delivering true security, not just compliance, so our approach to security posture is fundamentally different — we perform comprehensive monitoring of all security-impacting configurations in SaaS apps, not just compliance-related items, and we align them to security-oriented best practice recommendations. You want to avoid security problems before they occur, so we’ve taken a prevention-first approach, which means that we perform continuous monitoring that allows security teams to quickly identify and fix security risks as they arise often with a single click. Then you can lock security-critical settings in place with something we call Drift Prevention, which ensures there are no regressions caused by various app admins throughout the IT organization. We believe SaaS posture security is so important, that it doesn’t make sense to apply it to just a small handful of key apps. It’s likely that your sensitive data and user information spans dozens or perhaps hundreds of apps. That means posture security needs to be there for all your SaaS apps, or at least as many as possible. Which is why we’ve launched our service with support for over 40 apps, about 5 times more than traditional CASB vendors. And by the end of 2022, we are aiming to support over 100 apps, or about 20 times the level of SSPM support from traditional CASB vendors.
  5. Next, let’s talk about data security. The DLP capabilities within Palo Alto Networks next-gen CASB have been greatly expanded to address more contemporary data loss scenarios, for example the growing threat of sensitive data being shared within collaboration apps. We do this through the use of various techniques, including ML, EDM, OCR, and most recently, Natural Language Processing, or NLP, that helps us understand the context and meaning of unstructured chat data to find passwords, credentials, and other secrets, in near-real time within collaboration apps such as Slack or Teams. Your users can remediate incidents themselves on the spot, avoiding an incident that the infosec or data security teams have to respond to. With industry-leading API integrations of 27+ enterprise apps, Next-gen CASB offers the highest levels of data protection for sanctioned SaaS.
  6. And finally, let’s talk about how Palo Alto Networks Next-gen CASB stops attackers and insider threats from getting at your data. New behavioral analytics identifies suspicious user behavior that could indicate an attacker or malicious insider is attempting to exploit access to a SaaS application to obtain sensitive data or impersonate a user. Remember that every breach happens as a result of an action that was allowed, such as an authenticated user logging into an app, or allowed network access. The key requirement of ZTNA 2.0 is that all activity and objects, including non-person entities, are inspected and monitored, regardless of authentication or access policy, to ensure the safety of all content, and the legitimacy of all user actions inside SaaS apps. That is the only way to ensure complete security for SaaS. Part of how we do this is with Wildfire integrated right into our CASB. Wildfire is an incredibly capable anti-malware service which believe it or not, stops 224B threats per day.
  7. We are also able to apply our advanced DLP capabilities for private apps and SaaS apps all with the same DLP policy - so you don’t need to guess which apps are protected and what data is secure to continue realizing strong data protection and security policies across the board. To summarize, we provide complete visibility of SaaS consumption: Granular control of SaaS app features and functions SaaS security policy recommendations SaaS Security Posture Management Enterprise DLP w/ EDM, OCR, and ML/NLP Advanced Anti-Malware & Sandboxing Suspicious User Behavior Monitoring And all integrated with SASE Management
  8. About the customer A technology company innovating at the intersection of disruptive trends in the mobility industries, making vehicles safer, greener and more connected to enable the future of mobility. Global automotive technology leader, with more than 180,000 people across 124 manufacturing facilities and 12 major technical centers worldwide and presence in 44 countries Customer Challenge Relying on more apps in the cloud. Need visibility and granular control of known and unknown SaaS applications Need more efficient management (too many vendors/products), plus threat inspection Simple policy creation and deployment w/out leveraging proxy or agents Eliminating the need to synchronize risks, policies, and goals across a separate layer of the stack Eliminate requirement to update/configure agents for inline inspection Protecting unmanaged endpoints