Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netskope

20 Most Common CASB Use Cases

As people and organizations adopt cloud services, Cloud Access Security Brokers (CASBs) have become a must-have for any information security team. CASBs provide critical capabilities such as governing access and activities in sanctioned and unsanctioned cloud services, securing sensitive data and preventing its loss, and protecting against internal and external threats.

EU GDPR Cloud-Readiness and Compliance Checklist

The new set of European Union laws regarding personal data security in organisations, the EU General Data Protection Regulation (GDPR), has passed and requires organisations be compliant by 2018. As organisations start taking action to comply with the GDPR within the deadline, one of the most difficult areas is the cloud.

Allow is the New Block - 10 Requirements to Safely Say "Yes" to Shadow IT

Given the lack of visibility and control, what does the security team do about shadow IT? Do they take extreme security measures and try to block them using legacy security tools or do they allow their use and hope users stay secure from threats and don't leak sensitive data?

Plugging 5 Big Security Gaps in Office 365

Many of Netskope's largest customers also happen to be some of the largest Microsoft Office 365 customers. From three of the five largest global retail organizations to five of the largest healthcare organizations in the US, and enterprises across multiple verticals in between, Netskope helps secure their Office 365 deployments.

Cloud Security & SSL Decryption Overview

Growth of cloud services has ushered in a new computing architecture and, with it, a host of security challenges. Three such challenges include governing usage; protecting sensitive data and preventing its loss; and defending against threats that propagate in the cloud. Unlike traditional computing architectures in a corporate network - for which security solutions have been designed - cloud services enable security violations and threats to fly under the detection radar.