SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Netskope © 2015, Optiv Security Inc. © 2015
5 Highest-Impact CASB Use Cases
Bob Gilbert, Chief Evangelist
Netskope
Netskope © 2015, Optiv Security Inc. © 2015
“By 2017, organizations that have made a strategic decision to
invest in cloud applications for mission-critical workloads will
consider CASBs to be an essential security control.”
© 2016 Netskope. All Rights Reserved. 2
© 2016 Netskope. All Rights Reserved.
What is a Cloud Access Security Broker?
3
• Defined by Gartner in 2012;
• Cloud-based or on-premises;
• Sits between user and cloud app;
• Visibility and control of cloud apps as
they are accessed;
• Example policies: Authorization,
encryption, tokenization, logging,
alerting, authentication
© 2016 Netskope. All Rights Reserved.
Gartner’s Four Pillars of CASB
4
VISIBILITY
DATA SECURITY
COMPLIANCE
THREAT
PROTECTION
What is driving the need for a CASB?
5
Netskope © 2015, Optiv Security Inc. © 2015
There are 22,000 enterprise
apps today (and growing).
© 2016 Netskope. All Rights Reserved.
917 Apps Per Enterprise – It’s Easy to Buy and Use Them!
7
10%
70%
20%
MostlyUnsanctionedSanctioned
IT-led
Business-led
User-led
© 2016 Netskope. All Rights Reserved.
How Much of Your Business Data is in the Cloud?
8
30%
Data Breaches
Failed Audits =
Fines, Penalties
Loss or Theft of IP
or Sensitive Data
Loss of
Reputation,
Business
Disruption
© 2016 Netskope. All Rights Reserved. 9
© 2016 Netskope. Company Confidential
Four ways users interact with cloud apps (Office 365 example)
10
Web
Browser
Mobile
App
App
Ecosystem
Sync
Client
© 2016 Netskope. Company Confidential
Safe cloud enablement starts with covering all sources
11
Browser
Sync
Client
Mobile
App
App
Ecosystem
• Are risky activities taking place?
• Is sensitive data leaking? Where?
• Do users with unmanaged devices have the same
level of access as users with managed devices?
• What is your exposure to threats such as malware or
ransomware?
5 Highest-Impact
CASB Use Cases
Use Case #1
Discover cloud
apps, find sensitive
data, and assess
risk
14
1. Find all cloud apps and report
on enterprise-readiness of
each cloud app using 45+
criteria
2. Report on sensitive data being
shared publicly and outside
your company
3. Deployment requirements
typically include logs, TAP
mode, or inline for apps and
APIs for data
CASB
Requirements
Use Case #2
Prevent data
exfiltration
from sanctioned to
unsanctioned
cloud apps
Source: AT&T Cybersecurity Insights
16
CASB
Requirements
1. Inline deployment options to get
access to both sanctioned and
unsanctioned cloud traffic
2. Ability to decode details in
real-time about activity and data
3. Ability to associate personal and
corporate cloud app account
credentials
4. Ability to correlate events and
perform anomaly detection
5. Need to see cloud usage details
from browsers, sync clients, and
mobile apps
Use Case #3
Allow cloud apps
instead being forced
to block them
outright
18
1. See detail about real-time
activities across all cloud
apps
2. Support for category-level
policies such as ‘social
media’
3. Cloud DLP engine to focus
your policy on specific data
and use cases
4. Ability to apply context to
your policies
CASB
Requirements
Use Case #4
Provide granular
access control for
managed and
unmanaged devices
20
1. Ability to classify managed vs.
unmanaged devices
2. Ability to set policies based
on device classification
3. Support for granular policies
based on device classification
CASB
Requirements
Use Case #5
Find malware in
sanctioned apps,
remediate, and
reverse attack
fan-out
22
1. Ability to scan sanctioned cloud apps for
various malware types and quarantine
the files
2. Ability to replace the eradicated malware
with a tombstone file, letting the user
know of the action taken
CASB
Requirements
The Leading Cloud Access
Security Broker
Allow cloud apps instead being
forced to block them outright
Prevent data exfiltration
across all cloud apps
Discover cloud apps, find sensitive
data, and assess risk
Provide granular access control for
managed and unmanaged devices
Find malware in sanctioned apps,
remediate, and reverse attack fan-out
Don’t leave users in the dark,
coach them on safe usage
✓
✓
✓
✓
✓
✓
Netskope © 2015, Optiv Security Inc. © 2015
THANK YOU!

Weitere ähnliche Inhalte

Was ist angesagt?

07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
carlitocabana
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
Tom Laszewski
 

Was ist angesagt? (20)

AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 
Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...Application Whitelisting - Complementing Threat centric with Trust centric se...
Application Whitelisting - Complementing Threat centric with Trust centric se...
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
Présentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo WazuhPrésentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo Wazuh
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
SEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptxSEIM-Microsoft Sentinel.pptx
SEIM-Microsoft Sentinel.pptx
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
 
Empower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEMEmpower Your Security Practitioners with Elastic SIEM
Empower Your Security Practitioners with Elastic SIEM
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 

Ähnlich wie 5 Highest-Impact CASB Use Cases

Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 

Ähnlich wie 5 Highest-Impact CASB Use Cases (20)

Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
Top 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the CloudTop 3 Reasons to Move Existing Applications to the Cloud
Top 3 Reasons to Move Existing Applications to the Cloud
 
Which Cloud? It All Starts with Assessing Application Readiness
Which Cloud? It All Starts with Assessing Application ReadinessWhich Cloud? It All Starts with Assessing Application Readiness
Which Cloud? It All Starts with Assessing Application Readiness
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
J3602068071
J3602068071J3602068071
J3602068071
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 

Mehr von Netskope

Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
Netskope
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
Netskope
 

Mehr von Netskope (20)

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack Vector
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS Loopholes
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud Era
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCP
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
 
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud Report
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

5 Highest-Impact CASB Use Cases

  • 1. Netskope © 2015, Optiv Security Inc. © 2015 5 Highest-Impact CASB Use Cases Bob Gilbert, Chief Evangelist Netskope
  • 2. Netskope © 2015, Optiv Security Inc. © 2015 “By 2017, organizations that have made a strategic decision to invest in cloud applications for mission-critical workloads will consider CASBs to be an essential security control.” © 2016 Netskope. All Rights Reserved. 2
  • 3. © 2016 Netskope. All Rights Reserved. What is a Cloud Access Security Broker? 3 • Defined by Gartner in 2012; • Cloud-based or on-premises; • Sits between user and cloud app; • Visibility and control of cloud apps as they are accessed; • Example policies: Authorization, encryption, tokenization, logging, alerting, authentication
  • 4. © 2016 Netskope. All Rights Reserved. Gartner’s Four Pillars of CASB 4 VISIBILITY DATA SECURITY COMPLIANCE THREAT PROTECTION
  • 5. What is driving the need for a CASB? 5
  • 6. Netskope © 2015, Optiv Security Inc. © 2015 There are 22,000 enterprise apps today (and growing).
  • 7. © 2016 Netskope. All Rights Reserved. 917 Apps Per Enterprise – It’s Easy to Buy and Use Them! 7 10% 70% 20% MostlyUnsanctionedSanctioned IT-led Business-led User-led
  • 8. © 2016 Netskope. All Rights Reserved. How Much of Your Business Data is in the Cloud? 8 30%
  • 9. Data Breaches Failed Audits = Fines, Penalties Loss or Theft of IP or Sensitive Data Loss of Reputation, Business Disruption © 2016 Netskope. All Rights Reserved. 9
  • 10. © 2016 Netskope. Company Confidential Four ways users interact with cloud apps (Office 365 example) 10 Web Browser Mobile App App Ecosystem Sync Client
  • 11. © 2016 Netskope. Company Confidential Safe cloud enablement starts with covering all sources 11 Browser Sync Client Mobile App App Ecosystem • Are risky activities taking place? • Is sensitive data leaking? Where? • Do users with unmanaged devices have the same level of access as users with managed devices? • What is your exposure to threats such as malware or ransomware?
  • 13. Use Case #1 Discover cloud apps, find sensitive data, and assess risk
  • 14. 14 1. Find all cloud apps and report on enterprise-readiness of each cloud app using 45+ criteria 2. Report on sensitive data being shared publicly and outside your company 3. Deployment requirements typically include logs, TAP mode, or inline for apps and APIs for data CASB Requirements
  • 15. Use Case #2 Prevent data exfiltration from sanctioned to unsanctioned cloud apps Source: AT&T Cybersecurity Insights
  • 16. 16 CASB Requirements 1. Inline deployment options to get access to both sanctioned and unsanctioned cloud traffic 2. Ability to decode details in real-time about activity and data 3. Ability to associate personal and corporate cloud app account credentials 4. Ability to correlate events and perform anomaly detection 5. Need to see cloud usage details from browsers, sync clients, and mobile apps
  • 17. Use Case #3 Allow cloud apps instead being forced to block them outright
  • 18. 18 1. See detail about real-time activities across all cloud apps 2. Support for category-level policies such as ‘social media’ 3. Cloud DLP engine to focus your policy on specific data and use cases 4. Ability to apply context to your policies CASB Requirements
  • 19. Use Case #4 Provide granular access control for managed and unmanaged devices
  • 20. 20 1. Ability to classify managed vs. unmanaged devices 2. Ability to set policies based on device classification 3. Support for granular policies based on device classification CASB Requirements
  • 21. Use Case #5 Find malware in sanctioned apps, remediate, and reverse attack fan-out
  • 22. 22 1. Ability to scan sanctioned cloud apps for various malware types and quarantine the files 2. Ability to replace the eradicated malware with a tombstone file, letting the user know of the action taken CASB Requirements
  • 23. The Leading Cloud Access Security Broker Allow cloud apps instead being forced to block them outright Prevent data exfiltration across all cloud apps Discover cloud apps, find sensitive data, and assess risk Provide granular access control for managed and unmanaged devices Find malware in sanctioned apps, remediate, and reverse attack fan-out Don’t leave users in the dark, coach them on safe usage ✓ ✓ ✓ ✓ ✓ ✓
  • 24. Netskope © 2015, Optiv Security Inc. © 2015 THANK YOU!

Hinweis der Redaktion

  1. Official Gartner definition: CASBs are on-premises, or cloud-based, security policy enforcement points placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. CASBs consolidate multiple types of security policy enforcement. Example security policies include authentication, SSO, authorization, credential mapping, device profiling, encryption, tokenization, logging, alerting, malware detection/prevention and so on.
  2. There are more than 900 cloud apps per enterprise, on average. If we look at how these applications make their way into the enterprise, about 10% are sanctioned by IT and include apps such as Office 365, Salesforce, Box, and a variety of business applications. IT often doesn’t know about the other 90%. Those fall under the Shadow IT category. Shadow IT is created by apps being brought in by users and lines-of-business, who today feel more empowered than ever because apps are easy to get and use. Whether sanctioned or Shadow IT, many of these apps has an important, and sometimes critical, role to play in the success of your organization.
  3. The real question, though, is how much of your data is in these apps? What do you think? [build] Last year we did a study with Ponemon to examine the impact the cloud has on the probability and economic impact of a data breach. One of the question we asked IT and security professionals was how much business data they believe is in the cloud. Their (self-reported) estimate is about 30 percent. [build] Whether it’s 30 percent or more than that, it’s only going up from here.
  4. Discover Cloud Apps and Assess Risk   Show App Analytics page and go over top-level stuff we report on (number of app, users, etc.) Pivot to the CCI and talk about how to assess your risk associated with the cloud apps discovered Filter by cloud apps discovered, cloud storage category, and CCI score of poor Zoom into the app Droplr and talk about the 45+ criteria across 7 categories   Key point to stress: Discovery is often the starting point for many of our customers. Netskope’s advanced Discovery can help you assess your risk, do due diligence on new cloud apps that you may be considering bringing into your organization, or perhaps getting your arms around what your cloud spend is.   Show the demo when the wheel lands on: Find or Inspect
  5. Advanced Enterprise DLP   Show data exfiltration and infiltration use case slide Show a DLP rule where we look for a previous employer and the word confidential Show a document that is sensitive and try to upload it to sanctioned Box Policy is triggered and block message appears (use short video)   Key point to stress: Netskope provides the most powerful cloud DLP solution. Not only does it support for than 3,000 data identifiers, 500+ file types and advanced features like proximity and Exact Match, but you can also uniquely apply our DLP and leverage deep context to scan content tied to a real-time activity for both sanctioned and unsanctioned apps as well as content that is resident in sanctioned apps.   Show the demo when the wheel lands on: Secure or Encrypt (change action to encrypt)
  6. Step 1: As we discussed previously, you need to get a handle on what cloud apps are running in your environment and measure each one’s enterprise-readiness using 40+ factors.
  7. Step 2: The next step is to understand how those cloud apps are being used. You need visibility into the details of what the activities are taking in account contextual details such as the app, user, specific activity, and device that was used.
  8. Active Threat Protection   Show malware attack fan-out animation Show Box folder being shared with 70+ people and how many of them have sync clients Drag a malware test file to Box and show how it propagates to the local sync clients belonging to the users that have accepted the share Introduce Active Threat Protection - how you enable it in tenant and how it scans app instances and quarantines malware (mock-up dashboard) Summarize and also talk about how the malware that has been spread to sync clients is replaced by a safe tombstone file   Key point to stress: This demo is the first phase of our Active Threat Protection, which is about finding and quarantining malware in sanctioned cloud apps. We recently announced Active Threat protection, supporting the ability to find and remediate malware and threats in real-time as they are uploaded, downloaded, or shared across unsanctioned or sanctioned cloud apps.   Show the demo when the wheel lands on: Protect
  9. Advanced Enterprise DLP   Show data exfiltration and infiltration use case slide Show a DLP rule where we look for a previous employer and the word confidential Show a document that is sensitive and try to upload it to sanctioned Box Policy is triggered and block message appears (use short video)   Key point to stress: Netskope provides the most powerful cloud DLP solution. Not only does it support for than 3,000 data identifiers, 500+ file types and advanced features like proximity and Exact Match, but you can also uniquely apply our DLP and leverage deep context to scan content tied to a real-time activity for both sanctioned and unsanctioned apps as well as content that is resident in sanctioned apps.   Show the demo when the wheel lands on: Secure or Encrypt (change action to encrypt)