5 Highest-Impact CASB Use Cases
-
Upload
netskope -
Category
Technology
-
view
729 -
download
1
Transcript of 5 Highest-Impact CASB Use Cases
![Page 1: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/1.jpg)
Netskope © 2015, Optiv Security Inc. © 2015
5 Highest-Impact CASB Use Cases
Bob Gilbert, Chief EvangelistNetskope
![Page 2: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/2.jpg)
Netskope © 2015, Optiv Security Inc. © 2015 2
“By 2017, organizations that have made a strategic decision to invest in cloud applications for mission-critical workloads will consider CASBs to be an essential security
control.”
© 2016 Netskope. All Rights Reserved.
![Page 3: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/3.jpg)
3© 2016 Netskope. All Rights Reserved.
What is a Cloud Access Security Broker?
• Defined by Gartner in 2012;• Cloud-based or on-premises;• Sits between user and cloud app;• Visibility and control of cloud apps as
they are accessed;• Example policies: Authorization,
encryption, tokenization, logging, alerting, authentication
![Page 4: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/4.jpg)
4© 2016 Netskope. All Rights Reserved.
Gartner’s Four Pillars of CASB
VISIBILITY
DATA SECURITY
COMPLIANCE
THREAT PROTECTION
![Page 5: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/5.jpg)
5
What is driving the need for a CASB?
![Page 6: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/6.jpg)
Netskope © 2015, Optiv Security Inc. © 2015
There are 22,000 enterprise apps today (and
growing).
![Page 7: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/7.jpg)
© 2016 Netskope. All Rights Reserved. 7
917 Apps Per Enterprise – It’s Easy to Buy and Use Them!
10%
70%
20%
Mos
tly U
nsan
ctio
ned
San
ctio
ned
IT-led
Business-led
User-led
![Page 8: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/8.jpg)
© 2016 Netskope. All Rights Reserved. 8
How Much of Your Business Data is in the Cloud?
30%
![Page 9: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/9.jpg)
Data Breaches
Failed Audits =Fines, Penalties
Loss or Theft of IPor Sensitive Data
Loss of Reputation, Business Disruption
© 2016 Netskope. All Rights Reserved. 9
![Page 10: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/10.jpg)
© 2016 Netskope. Company Confidential 10
Four ways users interact with cloud apps (Office 365 example)
WebBrowser
MobileApp
AppEcosystem
SyncClient
![Page 11: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/11.jpg)
© 2016 Netskope. Company Confidential 11
Safe cloud enablement starts with covering all sources
Browser
SyncClient
MobileApp
AppEcosystem
• Are risky activities taking place?
• Is sensitive data leaking? Where?
• Do users with unmanaged devices have the same level of access as users with managed devices?
• What is your exposure to threats such as malware or ransomware?
![Page 12: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/12.jpg)
5 Highest-Impact CASB Use Cases
![Page 13: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/13.jpg)
Use Case #1Discover cloud
apps, find sensitive data, and assess risk
![Page 14: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/14.jpg)
14
1. Find all cloud apps and report on enterprise-readiness of each cloud app using 45+ criteria
2. Report on sensitive data being shared publicly and outside your company
3. Deployment requirements typically include logs, TAP mode, or inline for apps and APIs for data
CASB Requirements
![Page 15: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/15.jpg)
Use Case #2Prevent data exfiltration
from sanctioned to unsanctioned
cloud apps
Source: AT&T Cybersecurity Insights
![Page 16: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/16.jpg)
16
CASB Requirements1. Inline deployment options to
get access to both sanctioned and unsanctioned cloud traffic
2. Ability to decode details in real-time about activity and data
3. Ability to associate personal and corporate cloud app account credentials
4. Ability to correlate events and perform anomaly detection
5. Need to see cloud usage details from browsers, sync clients, and mobile apps
![Page 17: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/17.jpg)
Use Case #3Allow cloud apps
instead being forced to block them outright
![Page 18: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/18.jpg)
18
1. See detail about real-time activities across all cloud apps
2. Support for category-level policies such as ‘social media’
3. Cloud DLP engine to focus your policy on specific data and use cases
4. Ability to apply context to your policies
CASB Requirements
![Page 19: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/19.jpg)
Use Case #4Provide granular access control for
managed and unmanaged
devices
![Page 20: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/20.jpg)
20
1. Ability to classify managed vs. unmanaged devices
2. Ability to set policies based on device classification
3. Support for granular policies based on device classification
CASB Requirements
![Page 21: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/21.jpg)
Use Case #5
Find malware in sanctioned
apps, remediate, and reverse attack
fan-out
![Page 22: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/22.jpg)
22
1. Ability to scan sanctioned cloud apps for various malware types and quarantine the files
2. Ability to replace the eradicated malware with a tombstone file, letting the user know of the action taken
CASB Requirements
![Page 23: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/23.jpg)
The Leading Cloud Access Security Broker
Allow cloud apps instead being forced to block them outright
Prevent data exfiltration across all cloud apps
Discover cloud apps, find sensitive data, and assess risk
Provide granular access control for managed and unmanaged devices Find malware in sanctioned apps, remediate, and reverse attack fan-outDon’t leave users in the dark, coach them on safe usage
✓✓✓✓✓✓
![Page 24: 5 Highest-Impact CASB Use Cases](https://reader036.fdocuments.net/reader036/viewer/2022081420/586e71d01a28ab99598b4e6b/html5/thumbnails/24.jpg)
Netskope © 2015, Optiv Security Inc. © 2015
THANK YOU!