Cloud Security for Dummies - Webinar

About This Presentation
Title:

Cloud Security for Dummies - Webinar

Description:

Employees expect to work efficiently and flexibly wherever they are — at the office, at home, or on the road — using the most convenient way possible — whether that’s with a desktop computer, laptop, tablet, or smartphone. Increasingly that means people are getting their jobs done using cloud services. You may be intimidated by the idea of doing business in the cloud. But chances are, even if you don’t know it, you probably are. Today, people buy and deploy cloud services often without IT’s permission or involvement. This is called "shadow IT.". In this powerpoint, you'll find: • Cloud Security for Dummies – The 10 “Must Haves” • Finding and evaluating risk • Cloud security in practice • What makes a great cloud security policy To download our free eBook, please visit To watch the full Cloud Security for Dummies webinar video, please go to – PowerPoint PPT presentation

Number of Views:303

less

Transcript and Presenter's Notes

Title: Cloud Security for Dummies - Webinar


1
(No Transcript)
2
Meet the Authors
Ravi Ithal Chief Architect
3
What Well Discuss
  • Short commercial break Introducing Netskope
  • Cloud Security for Dummies The 10 Must Haves
  • Finding and evaluating risk
  • Cloud security in practice
  • What makes a great cloud security policy

4
Find, Understand, and Secure Cloud Apps for Safe
Cloud Enablement
The Netskope Active Platform
  • Real-time, granular control of any cloud app,
    sanctioned or not
  • Deep contextual visibility
  • Comprehensive end-point coverage and flexible
    deployment

5
IT estimate 40-50
88 cloud apps arent enterprise-ready
Safely enable apps you already know about
  • App Redundancy
  • 67 Marketing
  • 43 Collaboration
  • 38 HR
  • 31 Finance
  • 28 Storage
  • 25 CRM

Actual 613
Discover and control apps you dont know about
6
Find
Understand
Secure
Services
Control Sanctioned or Unsanctioned Apps
Comprehensive End-point Coverage
Data
IT-led
Native Thick-client Apps
Business-led
Activity
Native Mobile Apps
Deep Context
App
Browser-based Apps
User-led
Identity
Remote users
Flexible Deployment Options
Agentless
Reverse Proxy
Thin Agent
API Connectors
Log Analysis
In-Line Deployment Options
Out-of-Band Deployment Options
SOC-1, SOC-2, Type I and II worldwide cloud
On-premises secure appliance
7
Ten Must Haves for Safe Cloud Enablement
Detect anomaliesrisky behavior, security threats
Discover appsand assess risk
Segment appssanctioned/unsanctioned
Enforce granular policiesin real-time, across
any app
Protect data in contextwho, what, where,
activity, data
Secure access to appswith SSO
Audit activitiesuser/admin/data
Ensure complianceaudit trails, remediation,
reporting
Coach usersvia conversations and automated
Understand contentto, from, and in apps
8
Best practices that were demonstrated in this
webinar
  • Understand the risk in their organization
  • conduct forensics around stolen content
  • Set granular policies

9
What Makes a Great Policy?
10
SANCTIONED
UNSANCTIONED
11
Secure content in the app, no matter when uploaded
App
Introspection
Inspection
Secure content en route to or from the app
12
User
Location
Device
Time
Context
Risk
Activity
Content
w/Whom
13
Allow is the new block (allow is new block green
light slide)
14
Thanks for Attending! Questions?
rithal_at_netskope.com, _at_ravi_ithal krishna_at_netskope.
com, _at_Krishna_Nswamy lebinc_at_netskope.com,
_at_LBCnetskope stevem_at_netskope.com sales_at_netskope.c
om, _at_Netskope
Write a Comment
User Comments (0)