The NEXTGEN Cyber Security Business Unit includes the following go-to-market strategy:
Zero Trust Reference Architecture
Vendor technologies: Netskope, Okta, CrowdStrike, Proofpoint
Based on the mantra of “Never Trust, Always Verify,” Gartner’s Zero Trust Reference Architecture has become increasingly relevant since 2019. Zero Trust eXtended (ZTX) is a conceptual and architectural framework for moving security from a network-orientated, perimeter-based security model to one based on a continuous verification of trust. As the ZTX framework encompasses data, devices, networks, automation and analytics (amongst others), we must provide partners with the ability to scale technology as an ecosystem solution to achieve this for their customers.
SOC Visibility Triad
Vendor technologies: ExtraHop, CrowdStrike, Splunk
Slightly more mature than ZTX but just as relevant, the SOC Visibility Triad was originally coined to demonstrate security visibility through three key pillars: logs, network and data. Security visibility is the enabler for comprehensive incident response measures. We understand the customer’s need for enhanced visibility, so the CyberLAB™ delivers this instrumental technology integration across EDR, NDR and SIEM/UEBA.
Security observability
Vendor technologies: Netskope, Sysdig, Imperva, ExtraHop
Born in 2021, Security Observability is our newest go-to-market model that addresses the rapid, distributed and dynamic nature of securing cloud-native application deployments. This new paradigm of observability for security purposes has emerged as a core requirement for modern enterprises adopting complex, high-velocity cloud architectures. The CyberLAB™ enables NEXTGEN partners to show the value of security observability in cloud-native environments.
“The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C
The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:
Breach and attack simulation
Cyber security mesh architecture
Security product consolidation
Identity first and machine identity management
Privacy enhancing computation
Securing distributed digital assets
CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
Falcon Prevent
Better Protection
We solve the challenge of attack sophistication by providing better protection. We protect against all types of
attacks, prevent silent failure, proactively hunt for threats and optimize defenses with Threat Intelligence.
Reduced Complexity
We reduce complexity by simplifying endpoint security, decreasing the number of agents to manage and
eliminating agent bloat. We eliminate the on-premises infrastructure that needs to be maintained and kept up-todate.
Increased Efficiency
We increase security efficiency and provide a great workaround to the problem of skills shortage by accelerating
security operations, automating security operations, and reducing time and effort to respond to incidents.
“The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C
The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:
Breach and attack simulation
Cyber security mesh architecture
Security product consolidation
Identity first and machine identity management
Privacy enhancing computation
Securing distributed digital assets
CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
Benefits of the SOC Visibility Triad (NDR, EDR, SIEM)
Reduce exposure to risk and financial/reputationaldamage associated with data breaches and ransomware.
Empower SOC teams with optimized threat detection and response.
Enhance efficiency with single threat detection, response and forensics.
Monitor IoT threats which don't have endpoint security installed.
Save money with a single, powerful detection and response tool that works across on-premises, cloud, and hybrid environments.
Support digital transformation projects with the confidence that they will be built on secure foundations.
“The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C
The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:
Breach and attack simulation
Cyber security mesh architecture
Security product consolidation
Identity first and machine identity management
Privacy enhancing computation
Securing distributed digital assets
CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
“The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C
The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:
Breach and attack simulation
Cyber security mesh architecture
Security product consolidation
Identity first and machine identity management
Privacy enhancing computation
Securing distributed digital assets
CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
“The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C
The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:
Breach and attack simulation
Cyber security mesh architecture
Security product consolidation
Identity first and machine identity management
Privacy enhancing computation
Securing distributed digital assets
CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
Gartner Magic quadrant leader for CASB, but only vendor to be listed on both the CASB and Secure Web Gateway Gartner Magic Quadrant.
Netskopes Key Pillars:
Data Centric: Focus on providing granular visibility across organisation and staff activity.
Cloud Smart: Understands the cloud environment as it was born in the cloud, tools also sit in line with the cloud application as opposed to agent based on the endpoint.
Netskope aims to provide one of the network coverage through their NewEdge global coverage.
2012 - Enterprises adopting more cloud services, need to gain control of both sanctioned applications and provide visibility of shadow IT/control over unmanaged cloud use.
One of the differentiators I covered on the previous slide was our unified platform. The Netskope platform was born in the cloud from inception and designed to enable organizations to make the transition to the cloud safely using cloud-native security controls.
Leveraging both API and Inline controls, organizations can secure Sanctioned and Unsanctioned cloud services, Web traffic, and also private apps. All from a single console with granular policy enforcement powered by our CloudXD engine and utilizing a common set of microservices
These microservices include cloud discovery and risk assessment, advanced multi-layer data protection, analytics and forensics, post authentication access control, multi-layered threat protection … with the ability to add future services to address additional security needs.
And although we believe that Netskope has built the most comprehensive cloud security platform, it’s critical to integrate with other layers of your security stack. From SSO to SIEM to threat sharing, we offer a wide range of third-party integrations to help you get the most out of your other security investments.
It is also worth mentioning that Netskope is building the largest and most performant security cloud network in the world. We are calling this NewEdge and our goal is to be the onramp for all enterprises accessing the internet and where our security cloud will be accessible within 15ms of 80 percent of the world’s population and within 50ms of everyone else. Our network will soon rival that of a cloud provider and will be second-to-none in the security industry. This is important for customers because it enables us to continue to add robust, real-time security services without impacting end user performance
Netskope Cloud XD is the brain behind Netskope. It understands all inputs (Logs, SaaS, IaaS, Web) in extreme definition (XD) and performs big data analytics to eliminate blind spots and make policy enforcement simple across all cloud services and the web.
Legacy security tools force IT into a binary decision to allow or block cloud services because they have a very limited view of cloud transactions. Netskope, on the other hand, has a much more granular view including the identity of the user, location information, device classification (managed vs. unmanaged), instance of the cloud service (personal vs. corporate), what specific activity are they doing (upload, downloads, share, create, edit, etc.) and the content of the data. All of these inputs can be used to create granular cloud security policies.
A good example is allowing uploads of sensitive data from managed devices to OneDrive for Business while blocking uploads of sensitive data to Personal OneDrive. Netskope can enforce this policy without having to block access to Personal OneDrive.
Netskope’s vision is to provide the largest and most performant security network, in doing so we hired a guy called Joe De Pallo, the same guy that built out AWS network.
He brought with him a team of the world’s best internet experts to build NewEdge from the ground up.
Massive global footprint
75 unique locations [note: latest build out plan shows 59 locations]
Over 50 Terabits/s of network egress capacity
Netskope’s vision is to provide the largest and most performant security network
Mitigate shortcomings of the Internet and CSPs:
Detect downtime/regional outages
Identify slowness (latency, packet loss, routing)
Cloud Service Providers architected for cost
Auto-remediate failure conditions
Optimised for low latency - full control over all routing, peering and data centre locations to minimise reliance on the public internet.
<15ms latency to 80% of users
<50ms latency to 99% of users
Netskope’s Next Gen Secure Web Gateway is a cloud-based web security solution that:
Prevents malware & detects advanced threats.
Filters by category, protects data, and controls app use for any user, location, device.
Provides granular control (instance awareness and control at the activity level)
It unifies our industry-leading CASB, SWG, and DLP into common policy controls with custom reporting and rich metadata for ad-hoc queries.
“The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C
The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:
Breach and attack simulation
Cyber security mesh architecture
Security product consolidation
Identity first and machine identity management
Privacy enhancing computation
Securing distributed digital assets
CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
“The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C
The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:
Breach and attack simulation
Cyber security mesh architecture
Security product consolidation
Identity first and machine identity management
Privacy enhancing computation
Securing distributed digital assets
CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.
“The CyberLAB is a fully customized, virtual lab environment that showcases integrated technology solutions and offers scalable technical enablement. The CyberLAB can be end customer or partner facing and has been proven to speed up the opportunity lifecycle by 75%. The key differentiation of the C
The CyberLAB™ enables partners to rapidly deploy solutions and prove the value of cyber security investments. Backed by our cyber security intellectual property, market analysis and research and development, the CyberLAB™ helps showcase key industry trends, these include:
Breach and attack simulation
Cyber security mesh architecture
Security product consolidation
Identity first and machine identity management
Privacy enhancing computation
Securing distributed digital assets
CyberLAB is rapid technology deployments that are fully integrated, demonstrating the value of a cyber security solutions, not just a ‘point product’.