Download - Netskope — Shadow IT Is A Good Thing

Transcript
Page 1: Netskope — Shadow IT Is A Good Thing

Making Shadow IT Work

Page 2: Netskope — Shadow IT Is A Good Thing

Dear ,

I love you, I hate you.

Regards,The CIO

Page 3: Netskope — Shadow IT Is A Good Thing
Page 4: Netskope — Shadow IT Is A Good Thing

CLOUD CAGR FOR ‘13-’17 WILL BE 5XOF IT INDUSTRY AS A WHOLE

Page 5: Netskope — Shadow IT Is A Good Thing

ORGANIZATIONS ARE PUTTING THECLOUD TO WORK FOR BUSINESS

Page 6: Netskope — Shadow IT Is A Good Thing

Who?

What?

When?

with Whom?

Page 7: Netskope — Shadow IT Is A Good Thing

unsanctioned CLOUD APPS 72%

* OneLogin Survey 2012

of people admit to using

Page 8: Netskope — Shadow IT Is A Good Thing

of CLOUD APPS don’t make the grade

75% Cloud App

Cloud App

Cloud App

Cloud App

REPORT CARD

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 9: Netskope — Shadow IT Is A Good Thing

Evaluating Apps on Objective Criteria

• Measure of a cloud app’s enterprise-readiness• Based on the app’s security, auditability, and

business continuity• Based on 30+ objective criteria adapted from the

Cloud Security Alliance

EXCELLENT HIGH MEDIUM LOW POOR

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 10: Netskope — Shadow IT Is A Good Thing

1%

22%34%16%27%

EXCELLENT

HIGH

MEDIUM

LOW

POOR

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 11: Netskope — Shadow IT Is A Good Thing

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 12: Netskope — Shadow IT Is A Good Thing

Reasons Apps Do Well and Fall Short

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 13: Netskope — Shadow IT Is A Good Thing

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 14: Netskope — Shadow IT Is A Good Thing

Example: User and Admin Audit• Admin audit logs• Change/upgrade notifications• Data access logs• Infrastructure status reports• User audit logs

Page 15: Netskope — Shadow IT Is A Good Thing

Example: Certifications and Compliance• Compliance certifications– HIPAA– PCIDSS– etc.

• Datacenter certifications– SOC-1, -2– ISO27001– etc.

Page 16: Netskope — Shadow IT Is A Good Thing

Key Capabilities• Audit and alert capabilities• Certifications and compliance• Data classification capabilities• Disaster recovery and business continuity• Encryption• File sharing• Policy enforcement and access control

Page 17: Netskope — Shadow IT Is A Good Thing

April 14, 202317

10%

90%

Most Organizations Underestimate

Cloud App Usage by 90%

Page 18: Netskope — Shadow IT Is A Good Thing

CLOUD HAS CREATED A BLIND SPOT

The average number of security

While the percent of people stating they “don’t know”

Source: PwC

In the past 2 years…

if they’ve had a security breach increased 100%

incidents has risen 25%

Page 19: Netskope — Shadow IT Is A Good Thing

The Multiplier Effect of a Cloud Breach

3.3 devices perknowledge worker

50% of people share content via unapproved cloud services

90% of organizationsthat lost sensitivecontent via file sharing

5 out of top 10 data breaches involved cloud

?Source: Cisco Source: Ponemon

Source: CRNSource: Ponemon

0100011 110 01 1

1010

Page 20: Netskope — Shadow IT Is A Good Thing

Cost of a data breach:

$5.4 million

Source: Ponemon

• Remediation costs• Brand and reputation impact• Loss of intellectual property• Fines for non-compliance• Cost and time for reporting and prevention

Page 21: Netskope — Shadow IT Is A Good Thing

Yet, people love their cloud apps, and for good

reasonAnywhere Access CollaborationProductivity

Page 22: Netskope — Shadow IT Is A Good Thing

CAN’T COMPLY WITH SOX, ETC.

• Public biosciences co. would like to embrace cloud, but doesn’t know what services are running

• Can’t evaluate new services

• Can’t attest to access/auth usage for SOX and other regs, e.g., HIPAA

Page 23: Netskope — Shadow IT Is A Good Thing

POTENTIAL DATA LEAKAGE

• Large media firm discovered a dozen cloud storage apps, plus others in which data could be shared

• IT must see what sensitive data are being uploaded

• Then, see whether data are being shared, and with whom

Page 24: Netskope — Shadow IT Is A Good Thing

POST-EVENT FORENSICS

• High tech company suspects theft of proprietary documents by a departing employee

• IT must construct audit trail, showing user download from corporate account and subsequent upload to and share from personal account

Page 25: Netskope — Shadow IT Is A Good Thing

DISCOVER APPS & EVALUATE RISK

• Discover all apps, known or not• Objectively evaluate apps’

enterprise-readiness • Score apps on security,

auditability, and business continuity

Page 26: Netskope — Shadow IT Is A Good Thing

ANALYZE USAGE

• Discover who’s using what apps, from where, and on what device

• See what class of data are being uploaded, downloaded, shared

• See with whom data are shared

Page 27: Netskope — Shadow IT Is A Good Thing

LIMIT ACTIVITIES VS. BLOCK APPS

• Rather than block an app, limit usage (e.g., don’t share with people outside of the company)

• Use context such as user, location, device, data class, and user activity

Page 28: Netskope — Shadow IT Is A Good Thing

VERIFY AND THEN TRUST

• Create risk model of scenarios involving user, app, data, activity, and other contextual factors

• Set watch lists on scenarios that represent the most risk

Page 29: Netskope — Shadow IT Is A Good Thing

CONSIDER CONTEXT IN EVERYTHING YOU

DO• Consider contextual factors when

shining a light on shadow IT, running analytics and setting policies

• Think about user, group, location, time, device, OS, app, and app score

Page 30: Netskope — Shadow IT Is A Good Thing

1. DISCOVER cloud apps and evaluate risk2. Analyze USAGE3. LIMIT activities vs. blocking apps4. VERIFY and then trust5. Consider CONTEXT in everything you do

Page 31: Netskope — Shadow IT Is A Good Thing
Page 32: Netskope — Shadow IT Is A Good Thing

THANK YOU