Netskope Security Clouds Hands On: 2020 © Netskope Confidential. All Rights Reserved
Netskope Security Clouds Hands On: 2020 © Netskope Confidential. All Rights Reserved
Netskope Security Clouds Hands On: 2020 © Netskope Confidential. All Rights Reserved
2
2020 © Netskope Confidential. All rights reserved.
Lab Guide
● Access Lab Guides:
https://netskopeworkshops.learnupon.com
3
2020 © Netskope Confidential. All rights reserved.
Discussion #1
• Why are you here today? What are you hoping to get out of today’s training?
• What are your currently identified gaps/challenges around use of the cloud?
• What are you currently securing and why? What data is important to you?
• Do you consider your business: Cloud First, Cloud Next, or Cloud Last
Log API
Discovery Protection
THIRD PARTY
NEXT-GEN PUBLIC CLOUD PRIVATE INTEGRATIONS
CASB
SWG SECURITY ACCESS
SSO/IAM
Security Microservices
EDR/SIEM/SOAR
Adaptive Access Control Data Protection Compliance
SD-WAN/MDM
Single console for Third-Party Risk Threat Protection API/JSON Decoding
SaaS, IaaS, Web and Threat Intel Sharing
Private Access
And more…
NewEdge
Cloud
FIREWALL
IPS
DLP
SWG
SANDBOXING
Remote
Mobile Direct to net BYOD
access
85% 90%
Cloud
Final State
Castle & Application Lift & Shift Hybrid IT Direct-to-Cloud
The Moat Outsourcing
• How does your organization identify and approve application usage? Access Control?
• What approved Cloud Apps are sanctioned? How many others are Business led but
uncontrolled or unknown?
• What tools do you currently utilize to give you visibility into Shadow IT/Cloud
application usage, etc?
Stop technical Go where your Zero Trust is the Think big, Building with the
debt data is going Removal of move fast, and future in mind
Implicit Trust start small
Source IP
REQUEST 1 HTTP GET /
Destination IP
Bytes Up
REQUEST 2 Bytes Down HTTP POST
NGFW SWG
► Can only examine a fixed set of bytes ► Sees all, but limited to network protocols
► Lacks full context of the data stream ► SSL decrypt requires full architecture to support
► Offers limited ability to act beyond allow or block ► Offers no ability to action against cloud services
ALL
• Browser • Browser
• Mobile app • Browser only • Mobile app
Access
• Desktop app, sync client • Desktop app, sync client
• Quarantine sensitive data and malware • Prevent sensitive data to / from • Prevent sensitive data to / from
Use Cases • Encrypt sensitive data at rest • Stop malware • Stop malware
• Remove public shares of sensitive data • Encrypt sensitive data in real time • Encrypt sensitive data in real time
• Govern off-network unmanaged devices • Govern on- or off-network managed devices
Stop technical Go where your Zero Trust is the Think big, Building with the
debt data is going Removal of move fast, and future in mind
Implicit Trust start small
92% of pages in US
are now delivered with
encryption as of Jan 4,
2020.
30
2020 © Netskope Confidential. All rights reserved.
How do We See Data?
IaaS Private
(AWS, GCP, Azure) Applications
(Client VPN Replacement)
SaaS Data
Controlling the data and applying
(Business & Consumer) context.
Activity
Controlling specific activities
(View, Edit, Delete, Download, Upload)
Application
Blocking & Allowing Apps & Traditional URL Filtering
Blocking & Allowing Apps & URL Filtering
Stop technical Go where your Zero Trust is the Think big, Building with the
debt data is going Removal of move fast, and future in mind
Implicit Trust start small
Remote Users
Offices
NEW EDGE
Secure and Visibility, security, and Native access to Restrict access to No need to deal with
transparent access to compliance with remote servers from SaaS applications like overlapping IP issues.
applications in authorized access only any client device using Office365 and
No need to converge
multiple virtual and to specific applications SSH and RDP Salesforce based on
networks.
physical datacenters and data your corporate IP
address space
Employee Access
3rd-party Access DevOps Conditional Access M&A
to Hybrid IT
Stop technical Go where your Zero Trust is the Think big, Building with the
debt data is going Removal of move fast, and future in mind
Implicit Trust start small
Infrastructure
• Remediation Instructions for each
Security
• Security Report of each IaaS
Failed Rule Instance
Engineers Analysts
2020 © Netskope Confidential. All rights reserved.
Moving to the Cloud in Phases
Stop technical Go where your Zero Trust is the Think big, Building with the
debt data is going Removal of move fast, and future in mind
Implicit Trust start small
THIRD PARTY
NEXT-GEN PUBLIC CLOUD PRIVATE INTEGRATIONS
CASB
SWG SECURITY ACCESS
SSO/IAM
Security Microservices
EDR/SIEM/SOAR
Adaptive Access Control Data Protection Compliance
SD-WAN/MDM
Single console for Third-Party Risk Threat Protection API/JSON Decoding
SaaS, IaaS, Web and Threat Intel Sharing
Private Access
And more…
NewEdge
www.netskope.com
2020 © Netskope Confidential. All rights reserved.
Use Case 3: Safely Enable Web in Real-Time (30 minutes)