cloud security for dummies webinar

14

Upload: netskope

Post on 17-Jul-2015

200 views

Category:

Technology


10 download

TRANSCRIPT

Meet the Authors

Ravi IthalChief Architect

Krishna NarayanaswamyChief Scientist

Steve MalmskogChief Network Architect

Lebin ChengVP, Application Engineering

What We’ll Discuss

• Short commercial break: Introducing Netskope• Cloud Security for Dummies – The 10 “Must Haves”• Finding and evaluating risk• Cloud security in practice• What makes a great cloud security policy

Find, Understand, and Secure Cloud Apps for Safe Cloud Enablement

• Real-time, granular control of any cloud app, sanctioned or not

• Deep contextual visibility

• Comprehensive end-point coverage and flexible deployment

The Netskope Active Platform™

Actual:

613

IT estimate:

40-50 88% cloud apps aren’t enterprise-ready

Safely enable apps you already know about

App Redundancy:

• 67 Marketing• 43 Collaboration• 38 HR• 31 Finance• 28 Storage• 25 CRM

Discover and control apps you don’t know about

Data

Activity

App

Identity

Find Understand Secure

IT-led

Business-led

User-led

Ser

vice

sD

eep

Con

text

Flexible Deployment Options

Native Thick-client Apps

Native Mobile Apps

Browser-based Apps

Remote users

Control Sanctioned or Unsanctioned Apps

Comprehensive End-point Coverage

Agentless Reverse Proxy Thin Agent API Connectors Log Analysis

SOC-1, SOC-2, Type I and II worldwide cloud On-premises secure appliance

In-Line Deployment Options Out-of-Band Deployment Options

Ten “Must Haves” for Safe Cloud Enablement

7

Discover appsand assess risk

Segment appssanctioned/unsanctioned

Secure access to appswith SSO

Audit activitiesuser/admin/data

Understand contentto, from, and in apps

Detect anomaliesrisky behavior, security threats

Enforce granular policiesin real-time, across any app

Protect data in contextwho, what, where, activity, data

Ensure complianceaudit trails, remediation, reporting

Coach usersvia conversations and automated

© 2015 Netskope. All Rights Reserved.

Best practices that were demonstrated in this webinar

• Understand the risk in their organization• conduct forensics around stolen content• Set granular policies

What Makes a Great Policy?

10

SANCTIONED UNSANCTIONED

© 2015 Netskope. All Rights Reserved.

11

AppIntrospection

Inspection

Secure content in the app, no matter when uploaded

Secure content en route to or from the app

12

User Location Device

Time

Activity

Context

Content

Risk

w/Whom

13

Allow is the new block (allow is new block green light slide)

© 2015 Netskope. All Rights Reserved.

Thanks for Attending! Questions?

14

[email protected], @[email protected], @[email protected], @[email protected]

[email protected], @Netskope