Cloud Security for Dummies Webinar

14

description

Cloud Security for Dummies - WebinarEmployees expect to work efficiently and flexibly wherever they are — at the office, at home, or on the road — using the most convenient way possible — whether that’s with a desktop computer, laptop, tablet, or smartphone.Increasingly that means people are getting their jobs done using cloud services. You may be intimidated by the idea of doing business in the cloud. But chances are, even if you don’t know it, you probably are. Today, people buy and deploy cloud services often without IT’s permission or involvement. This is called "shadow IT." It also means that sensitive company data is being uploaded, downloaded, and shared on a daily basis. And many times, the apps being used to do that work aren’t being used safely.That’s where Cloud Security For Dummies, Netskope Special Edition, comes in. This webinar, hosted by Netskope's co-founders and chief architects, answers all your questions so you can conduct business securely in the cloud.In this powerpoint, you'll find:• Cloud Security for Dummies – The 10 “Must Haves”• Finding and evaluating risk• Cloud security in practice• What makes a great cloud security policyTo download our free eBook, please visit https://www.netskope.com To watch the full Cloud Security for Dummies webinar video, please go to https://resources.netskope.com/h/i/53873665-cloud-security-for-dummies-the-official-webinar

Transcript of Cloud Security for Dummies Webinar

PowerPoint Presentation

DURING WELCOME1

Meet the AuthorsRavi IthalChief Architect

Krishna NarayanaswamyChief Scientist

Steve MalmskogChief Network Architect

Lebin ChengVP, Application EngineeringWhat Well DiscussShort commercial break: Introducing NetskopeCloud Security for Dummies The 10 Must HavesFinding and evaluating riskCloud security in practiceWhat makes a great cloud security policy

Find, Understand, and Secure Cloud Apps for Safe Cloud EnablementReal-time, granular control of any cloud app, sanctioned or notDeep contextual visibilityComprehensive end-point coverage and flexible deploymentThe Netskope Active Platform

In short, the Netskope Active Platform does three things: 1. Enables you to discover the cloud apps in your environment and understand their risk; 2. Gives you deep visibility into user activities in those apps, like whos sharing, what are they sharing, and who are they sharing with; and 3. Gives you granular control at the activity- and data-level. So, for example, you can set a policy that says Dont let non-U.S. HR professionals download PII from any HR app to a mobile device. Its that precise and granular.

The things that make us unique are that we provide our customers real-time, granular control over any app, not just your sanctioned ones; we give you visibility and control in context (who, what, when, where, and with whom); and we provide the broadest array of deployment options. Because we support those deployment options, it means we can support the broadest set of endpoints and use cases, now and in the future.4

Actual:613IT estimate: 40-5088% cloud apps arent enterprise-readySafely enable apps you already know aboutApp Redundancy:

67 Marketing43 Collaboration38 HR31 Finance28 Storage25 CRMDiscover and control apps you dont know aboutHowever, for all of the cloud goodness that drives this adoption also comes tremendous cloud app sprawl. We at Netskope perform cloud assessments for our prospects and find that while IT usually estimates that they have about 40-50 apps running in their organizations (only a handful of which they manage), we discover more than 500. Beyond the sheer volume of apps, the number of apps in business-critical categories is surprising 61 marketing, 39 HR, and 32 finance apps. And nearly 90% of those apps arent enterprise-ready, according to our Cloud Confidence Index. We see the challenge as this: safely enable the apps you roll out, and discover and get control over the ones you dont know about.

5DataActivityAppIdentityFindUnderstandSecureIT-ledBusiness-ledUser-ledServicesDeep ContextFlexible Deployment OptionsNative Thick-client AppsNative Mobile AppsBrowser-based AppsRemote usersControl Sanctioned or Unsanctioned AppsComprehensive End-point CoverageAgentlessReverse ProxyThin AgentAPI ConnectorsLog AnalysisSOC-1, SOC-2, Type I and II worldwide cloud On-premises secure applianceIn-Line Deployment OptionsOut-of-Band Deployment OptionsWhat this amounts to is the ability to provide these services on top of rich and granular context, provide them for any app, sanctioned or not, across an array of devices and access scenarios, and supporting any deployment depending on our customers use case. 6Ten Must Haves for Safe Cloud Enablement7

Discover appsand assess riskSegment appssanctioned/unsanctionedSecure access to appswith SSOAudit activitiesuser/admin/dataUnderstand contentto, from, and in appsDetect anomaliesrisky behavior, security threatsEnforce granular policiesin real-time, across any appProtect data in contextwho, what, where, activity, dataEnsure complianceaudit trails, remediation, reportingCoach usersvia conversations and automated 2015 Netskope. All Rights Reserved.Best practices that were demonstrated in this webinarUnderstand the risk in their organizationconduct forensics around stolen contentSet granular policies

What Makes a Great Policy? 10SANCTIONEDUNSANCTIONED

One framework we use to think about cloud apps starts with how those apps come into your environment, and whether theyre sanctioned or not. Some are brought in by IT, some by lines-of-business, and some by individuals. Each of these app types has an important, and often business-critical, role to play in the success of your organization. Even Twitter is a must-have for many organizations and not just in marketing, but in customer support, business development, and the executive team. We at Netskope have thought through how to safely enable apps, whether sanctioned or not, and regardless of how they come into your environment.10 2015 Netskope. All Rights Reserved.11AppIntrospectionInspectionSecure content in the app, no matter when uploadedSecure content en route to or from the app12

UserLocationDeviceTimeActivityContextContentRiskw/WhomContext is critical and youd be surprised how deep an understanding you can get

Understand

App riskWho is using the service and where theyre using it from

Understand the devices that are being used to access these apps

Understand the content and if its sensitive or not

Get to know the types of activities that people are conducting in these apps. In the case of sharing, understand who they are sharing with.

12Allow is the new block (allow is new block green light slide)

13

By giving you granular visibility and control with the Netskope Active Platforms deep context, we help you take a scalpel to the problem by addressing risky behavior rather than blocking apps. This take on our customer Netflixs series, Orange is the New Black, may seem like a silly quip, but it perfectly exemplifies the power of our platform you can finally be in a position of yes rather than no, and be there safely.13 2015 Netskope. All Rights Reserved.Thanks for Attending! Questions?14

[email protected], @[email protected], @[email protected], @[email protected]

[email protected], @NetskopeRember, at the conclusion of our webinar, a window will open asking you to provide us with your mailing address for your hard copy of the book.

14