Netskope

Los Altos, CA, USA
2012
Jan 18, 2022   |  By Lamont Orange
No sooner did word start to spread about Apache Log4j that the usual torrent of blaring headlines, vendor marketing, and tips and tricks-style “information” quickly followed. You can find plenty of solid technical analysis out there about Log4j, and we’ve already posted information about Netskope protections and threat coverage from Netskope Threat Labs. But that’s not this post.
Jan 14, 2022   |  By Paolo Passeri
Welcome to the first edition in 2022 of our Cloud Threats Memo! One of the key findings of our Cloud and Threat Report – January 2022 is the leadership of Google Drive as the most exploited cloud app for the distribution of malware (and for the record, guess which service ranks at number two—spoiler alert: it is a cloud storage service from Microsoft). Unsurprisingly, this is not the only way in which threat actors can exploit these and other cloud services.
Jan 13, 2022   |  By Chad Berndtson
Security Service Edge (SSE) describes the evolving security stack crucial to a Secure Access Service Edge (SASE) journey, with core platform requirements that include CASB, SWG, and ZTNA capabilities. SASE is an architecture—really, a long-term journey that will change how we all think about security and networking. But SSE, as part of SASE, is a set of cloud-delivered security services you can acquire and make the most of today.
Jan 12, 2022   |  By Gustavo Palazolo
In November of 2021, we described several techniques used by attackers to deliver malware through infected Microsoft Office files. In addition to exploits like CVE-2021-40444, these infected documents frequently abuse VBA (Visual Basic for Applications) to execute their techniques, regardless of the final payload. Attackers also often use extra layers of protection to evade signature-based detections, like constructing PowerShell scripts and WMI namespaces at runtime, as done by Emotet.
Jan 11, 2022   |  By James Robinson
Every functioning security team has an incident response plan. Advance strategizing and preparation are absolutely imperative to ensure a quick response to data breaches, ransomware, and numerous other challenges, but most companies first developed that plan years, if not decades, ago and now only revisit it periodically. This is a problem. How many organizations have developed a separate incident response plan to address the unique risks of the software-as-a-service (SaaS) era? Far too few.
Jan 11, 2022   |  By Gustavo Palazolo
Naming themselves Night Sky, a new ransomware family was spotted on the first day of 2022, by the MalwareHunterTeam. They appear to work in the RaaS (Ransomware-as-a-Service) model, similar to other ransomware groups like REvil, LockBit, and Hive, publishing stolen data exfiltrated throughout the attack in a deep web site if the ransom is not paid by the victim. Currently, there are two companies listed on their deep web site, where the group has published the victim’s allegedly stolen data.
Jan 6, 2022   |  By Mark Day
In recent blogs, we’ve explored the role of Security Service Edge (SSE) technologies as part of a SASE architecture, and the key differences between SSE and SASE. But so far, we’ve focused more on overall functionality than on its realization and what SSE means from a cloud design and implementation perspective. In this post, we shift gears to put a spotlight on networking and infrastructure as it relates to security clouds.
Jan 4, 2022   |  By Colby Proffitt
President Biden’s Executive Order 14028 to improve the nation’s cybersecurity and protect federal government networks, was released more than half a year ago. At the time, one of the most exciting aspects about it was the multiple uses of the term “zero trust,” as Netskope discussed in a blog at the time. However, it’s clear that federal agencies are still working out the specifics of how to actually approach implementing zero trust.
Dec 30, 2021   |  By Damian Chung
In the first half of 2021, average ransomware demands surged by 518%, while payments climbed by 82%. There has been a growing number of attacks in healthcare, with 560 healthcare facilities hit by ransomware last year in the U.S. alone. As new attacks generate headlines each week, we get real-world use cases for how ransomware proliferates in diverse ways, including social engineering attacks and exploitation of vulnerabilities.
Dec 29, 2021   |  By Gustavo Palazolo
A new vulnerability was discovered in the Apache Log4j library. Tracked as CVE-2021-44832, this bug may allow arbitrary code execution in compromised systems when the attacker has permissions to modify the logging configuration file. CVE-2021-44832 has received a CVSS score of 6.6 out of 10, and it affects all versions of Log4j from 2.0-alpha7 to 2.17.0, excluding 2.3.2 and 2.12.4. This is the fourth Log4j vulnerability addressed by Apache in December 2021.
Jan 18, 2022   |  By Netskope
Start building dashboards and widgets using the tools in Explore - Part 2 Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Jan 14, 2022   |  By Netskope
Learn how to create a report from the Explore menu. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Jan 10, 2022   |  By Netskope
Use table calculations to roll up Total/Percentages into a single value for summary visualizations. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Jan 4, 2022   |  By Netskope
Pull data from two different data sets and show in a single visualization. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Jan 3, 2022   |  By Netskope
Netskope Advanced Analytics: Learn how to build and customize GeoMaps. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Dec 20, 2021   |  By Netskope
Advanced concepts in custom measures. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Nov 30, 2021   |  By Netskope
Netskope Advanced Analytics: Learn how to build and customize bar charts. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Nov 16, 2021   |  By Netskope
Use pre-built dashboards as a starting point to visualize risk. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Nov 12, 2021   |  By Netskope
Use custom dimensions to tailor views of your data sets. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Nov 10, 2021   |  By Netskope
Use custom dimensions and measures to aggregate column values or filter data. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
Jan 16, 2022   |  By Netskope
Grab your copy of the first ever book on SSE Security Service Edge (SSE) is described by Gartner as the security stack of services within a SASE architecture. SSE is fast, easy to use, and secures your business wherever your people and data go. In this book, you'll: Download the very first SSE For Dummies book on the market where we cut through the acronyms to give you a functional understanding of how this set of tools will impact your security going forward.
Feb 21, 2019   |  By Netskope
Google Cloud Platform (GCP) provides a great way to save money and move faster. But administrators aren't often aware of the best security practices and controls to implement. How do you move to GCP efficiently without increasing the risk of a security breach? Read this new whitepaper to help your organization avoid common mistakes.
Oct 9, 2018   |  By Netskope
As you evaluate cloud access security brokers (CASBs) to safely enable sanctioned and unsanctioned (shadow IT) cloud services, cloud DLP is an important component of the solution. This 6-question checklist will give you specific, use case-based examples to help you di_x001F_fferentiate between CASBs and choose the right one for your organization.
Oct 6, 2018   |  By Netskope
To achieve business goals, business leaders are choosing to work with multiple cloud providers, embracing di_x001F_erent clouds optimized for various services. By distributing workloads and mitigating risk, a multi-cloud approach is increasingly recognized as a good strategy for organizations that want to maximize the bene_x001E_its of the cloud and also easily adapt to changing business needs. In this eBook, we focus on _x001E_ive common questions about multi-cloud.
Aug 29, 2018   |  By Netskope
While AWS manages security of the cloud, security in the cloud is the responsibility of the customer. Security teams need to understand their part in the shared responsibility model, where customers retain control of what security they choose to implement to protect their own content, platform, applications, systems, and networks, no differently than they would for applications in an onsite data center.
Aug 1, 2018   |  By Netskope
In this white paper, we'll share the behavior of malware infections by exploring the relationships between cloud application users and their files residing in the cloud. Netskope has observed such user-file relationships in cloud applications such as Google Drive, Dropbox, AWS, etc. in customer environments.
Apr 12, 2018   |  By Netskope
How to deliver AWS security that guards data everywhere and stops elusive attacks. This eBook contains 5 steps you can follow to boost your AWS security posture and shows how Netskope can help you implement them.
Mar 26, 2018   |  By Netskope
Everything is moving to the cloud. Certainly your apps are, with well over a thousand cloud apps in the average enterprise today. Your infrastructure is moving to the cloud too, with IaaS services such asAWS and Azure growing at a rapid pace. Most importantly, your critical data is moving to the cloud.
Mar 26, 2018   |  By Netskope
The way people work has changed. Driven by the increasing use of cloud services and mobile devices, people now expect to be able to work at any time, from any place, and on any device. These changes are dramatically altering the network and security infrastructure in many organizations.
Dec 4, 2017   |  By Netskope
Traditional security providers lack capabilities to address today's critical use cases. This eBook discusses seven of these gaps and how you can address them.

Netskope is the leader in cloud security.

We help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our patented Cloud XD technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.

Unique Capabilities:

  • Eliminate Blind Spots: Patented and built in the cloud, Netskope Cloud XD™ understands SaaS, IaaS, and web in extreme definition and performs big data analytics in real time. This eliminates the blind spots across thousands of SaaS and IaaS services, and millions of websites.
  • Guard Data Everywhere: Award-winning 360º data protection guards sensitive data everywhere through advanced cloud DLP and encryption across SaaS, IaaS, and web. Built in the cloud, Netskope works regardless of location or device and handles the direct-to-cloud and direct-to-web traffic that others miss.
  • Stop Elusive Attacks: Only Netskope advanced threat protection stops elusive attacks across SaaS, IaaS, and web. Built in the cloud with real-time and deep detection engines, Netskope finds malware and ransomware that evade legacy tools when they traverse both cloud and web to inflict damage.
  • Full Control, One Cloud: The industry’s only SaaS, IaaS, and web security platform built from the start in one cloud. Unlike other tools, Netskope eliminates policy conflict through standardized categories across SaaS, IaaS and web. Built in the cloud, Netskope scales automatically to meet your needs.

It’s time for smart cloud security.