Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud

Cloud Threats Memo: Keeping Collaboration Apps Secure

During the pandemic, collaboration apps such as Microsoft Teams and Zoom have played an important role in connecting the distributed workforce and helping organizations to cope with the so-called “new normal.” Even if we are finally starting to see the light at the end of the tunnel (and this time it’s a real light), the world won’t be exactly the same as it was before.

Things to Ask Your SSE Vendor: Episode 2: Does the ZTNA service offer DLP for private apps?

When it comes to private apps, data protection is critical. In this video see how SSE can be used to prevent employees and third-parties from downloading data, without the need for separate remote browser isolation technologies. Get ready to ask your vendor about their ability to protect private data from getting into the wrong hands.

Take Control of Your Cloud Security: Introducing Storage Tiering for Microsoft Azure

As organizations deploy more and more cloud native workloads, the ability to protect them in a secure and cost-effective manner is becoming increasingly important. Data access is also more widely spread, making it even more critical to meet this protection need with a secure, logically air-gapped copy of that data.

Introducing Data Security Posture Management (DSPM) Platform

You’re a cloud-based company, your entire business model relies on cloud data and your cloud environment is VERY precious to you, correct? That’s why you invest all of your resources into protecting this environment from the outside world. You want to make sure that the perimeter between your cloud data and the outside world is 100% safe, I get it. But what if I told you that your goal is to protect your crown jewels, a.k.a - the data itself?

8 Steps to a Successful Cloud Data Migration

It is rare nowadays to hear of a business strategy that doesn’t entail a cloud strategy. So it comes as no surprise that 85% of organizations are expected to embrace a cloud-first principle by 2025, as estimated by Gartner. But migrating all your organization’s data, applications, and business processes to a new environment can be daunting.

8 Steps to a Successful Cloud Data Migration

It is rare nowadays to hear of a business strategy that doesn’t entail a cloud strategy. So it comes as no surprise that 85% of organizations are expected to embrace a cloud-first principle by 2025, as estimated by Gartner. But migrating all your organization’s data, applications, and business processes to a new environment can be daunting.

Security Service Edge (SSE) is a Profound Moment for Cloud, Data, and Network Security

Today we are very excited to share that Netskope has been named a Leader in the 2022 Gartner ® Magic Quadrant ™ for Security Service Edge (SSE). This Magic Quadrant for SSE* is the first such SSE analysis of its kind, and I invite you to read the full SSE report (available here) to learn how Netskope was recognized for its completeness of vision and ability to execute.

FedRAMP Cloud Service Providers and Services

Google adopted its cloud infrastructure, Google Cloud Platform (GCP), to be compliant with FedRAMP. GCP earned a FedRAMP High authorization to operate (ATO) for several cloud products in a handful of locations and has uplifted the current FedRAMP Moderate services to more products and locations. Government agencies can now work with the highest level of classified information using GCP.

Welcoming Fugue as we build the future of developer-first cloud security

Today, I am excited to announce Snyk’s acquisition of Fugue and welcome their team to the Snyk family. The addition of Fugue to Snyk’s platform will allow us to continue our mission to help developers find and fix security issues in the applications they create, by providing visibility into the security of applications and the cloud services they use. But it’s about more than just visibility of the cloud posture.