SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
“Allow is the New Block” in Action:
10 Alternatives to Heavy-Handed
Cloud App Control
ALLOW IS THE NEW BLOCK 1
“Allow is the New Block”
“Allow is the New Block” is a philosophy we live by at Netskope. It encapsulates our view on
cloud enablement and reflects our product capabilities. But it’s more than just a glib catch-
phrase. We believe in it and there’s real meaning and substance behind it.
For as long as the term “Shadow IT” has existed, technology vendors have encouraged IT
professionals to uncover unsanctioned IT in their organizations so they can block it. And if you
think about things from a purely security-oriented point-of-view, blocking makes a lot of
sense. But we, and our customers, are taking a different tack. Our point of view is that blocking
any useful technology doesn’t work and ultimately does the IT organization and the business a
disservice. Cloud apps like Box, Dropbox, Jira, NetSuite, and Workday help people get their jobs
done more efficiently and flexibly, and people will always find ways to use cloud apps, even if it
means going outside of enterprise policy.
Our view is that with a little diligence, the right data, and the ability to enforce policy in a very
precise manner, enterprise IT can eliminate the catch-22 of enabling the cloud while protecting
the enterprise. By looking closely at cloud app usage, using granular policies to shape behavior,
and using data to have a conversation with users and lines of business, they are eschewing
heavy-handed controls for a more nuanced and effective approach.
10 Alternatives to Heavy-Handed Cloud App Controls
Below are ten best practices we generalize from the thoughtful and creative approach our
customers are taking.
1. Evaluate app risk
After discovering cloud apps in their
environment, many of our customers evaluate
the risk of those apps. They use the Netskope
Cloud Confidence Index™ (CCI) to give them an
enterprise-readiness score based on objective
criteria. For a low-confidence app, they then
evaluate the app based on how it is used in the
enterprise. Is it used for high-value or
mission-critical activities or does it handle
sensitive data? If so, they may limit certain
activities in the app or partner with the
business to select a less-risky app that offers
similar functionality. If not, they may simply let the app continue and monitor it closely. This is
especially important for the apps they don’t procure or administer, but are still broadly used in
the enterprise.
2. Monitor usage
Many of our customers go beyond discovering cloud apps to understand what people are doing
in them. One Netskope customer in the media industry employs a usage framework to evaluate
the scope, business case, and risk of the app. IT measures app user counts and usage volume
ALLOW IS THE NEW BLOCK 2
to ascertain scope. For heavily-used apps, they identify activities (e.g., sharing, downloading,
and editing), and build a business case to either support the app or, in the case of app overlap,
suggest consolidation. Finally, they look at usage through a risk lens, assigning each activity a
risk level. When they find an app in which users are performing high-risk activities, they set a
policy blocking the risky activity.
3. Look for anomalies
The above example highlights the
importance of looking at behaviors
within apps, not just the presence
of an app. Some questions our
customers ask when they use our
solution is: What is the usage
baseline of this app, and are there
spikes in usage or activity? Are
there more sessions than normal
in a given time period? Excessive downloading? People logging in from locations they shouldn’t
be, or from two locations at once? These behaviors can signal risky behavior or even an external
attack.
4. Block an activity, not an app
Some technology vendors
encourage IT to uncover
unsanctioned apps so they can
shut them down. This
sledgehammer approach rarely
works and pits IT against the
business in a negative way. Rather
than block an app wholesale,
several of our customers analyze
the activities within the apps that
represent the most risk (e.g.,
downloading to a mobile device,
sharing with someone outside of the company) and block them. This lets them shape the
activity to mitigate risk. Key to this is that they do this for not just the apps they manage but
especially for the ones they don’t.
5. Protect data in context
Adopters of data leakage prevention solutions – or any detection technologies for that matter –
know full well that too many false positives erode the value of a solution. As our customers
think about cloud data loss prevention, they are being smart about context. Rather than just
detect patterns or key words, they are using Netskope to define granular contextual situations
incorporating user, group, app category, location, device, and activity (such as upload or share)
that help narrow the scope of where a data breach is likely to occur. This helps them increase
their accuracy when they do apply data loss prevention techniques such as blocking or
encrypting.
ALLOW IS THE NEW BLOCK 3
6. Have a conversation
One of our e-commerce customers needs to keep a close eye on PCI DSS compliance. But they
also have an enabling philosophy when it comes to cloud apps. So, when IT finds an app that
does not facilitate PCI compliance or identifies a behavior within an app that could hurt their
compliance status, they learn how the app is being used, come up with a few options to
improve their compliance status, and then have a conversation about it with the user or line of
business. Tapping someone on the shoulder and having a data-driven conversation increases
the chance of an optimal outcome for both IT and the business.
7. Provide alternatives
One of our healthcare customers is all about coming to the conversation not just with data, but
with alternatives. They use the CCI to identify apps that have similar features and functionality
to riskier ones the business may be using. In the conversation, IT points out why the apps in
use put the business at risk (e.g., poor auditability or lack of HIPAA compliance) and offer
choices that have a higher confidence score. This positions IT as a problem-solver and
increases the chances that users will solicit IT’s input before procuring a cloud app the next
time around.
8. Trust but verify
One of our media customers is reluctant to put onerous policies in place. Their culture centers
on trusting people, and their risk profile enables them to make the tradeoff of permissiveness
with potential data leakage. They balance this by auditing cloud app usage on a periodic basis
as well as setting watch lists for particular behaviors that can signal a potential data breach or
malicious activity.
9. Do forensics in the cloud
In addition to cloud audits, several of our customers perform forensic analysis after a suspected
breach. In one example, a departing employee of one of our customers stole proprietary
content to take to a competitor. IT identified the data breach as well as the events leading up to
it, giving the company enough evidence to approach the competitor and recover the content. As
a result of the accurate, thorough forensic audit trail, the employee in question lost his job not
only at our customer, but also at the competitor.
ALLOW IS THE NEW BLOCK 4
10. Get specific
Many of the above examples point to the benefit of specificity. Our customers are running
analytics and setting policies based on combinations of app, category, user, group, location,
device, OS, browser, time, app confidence score, activity, and content. This specificity allows
them to, for example, be alerted when people in Investor Relations share content from a cloud
app during the company’s quiet period, block downloads of sensitive documents to mobile
devices, prevent HR employees from accessing salary data outside of work, and limit content
uploads for people in Germany to apps hosted in the United States.
The above are ways our customers are taking a lean-forward approach to cloud adoption and
enablement while also mitigating risk and keeping their businesses compliant with their
policies. What’s cool is not one of the ten examples above includes an outright “no” to a cloud
app. While some of our customers conclude that blocking an app is the right approach, it is
with the right usage data, the right information about app risk, and the granularity to shape
usage with a fine scalpel versus a sledgehammer.
ABOUT NETSKOPE
Netskope is the cloud app analytics and policy company. Only Netskope eliminates the catch-22
between being agile and being secure and compliant by providing complete visibility and
enforcing sophisticated policies in cloud apps. Netskope performs deep analytics and lets
decision-makers create policies in a few clicks that protect corporate data and optimize cloud
app usage in real-time and at scale. With Netskope, people get their favorite cloud apps and the
business can move fast, with confidence.
©2014 Netskope, Inc. All rights reserved. 4984 El Camino Real, Suite 102, Los Altos, CA 94022
Netskope is a registered trademark and Cloud Confidence Index and SkopeSights are trademarks of Netskope, Inc.
All other trademarks are trademarks of their respective holders. 1/14 SB-8-1

Mais conteúdo relacionado

Mais procurados

SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsBIWUG
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]LinkedIn
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
Learn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentLearn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentStave
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
The advantages of Cloud Application Control
The advantages of Cloud Application ControlThe advantages of Cloud Application Control
The advantages of Cloud Application ControlWeb Werks Data Centers
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewDavid J Rosenthal
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:HyTrust
 

Mais procurados (19)

SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Dreamforce 2015
Dreamforce 2015Dreamforce 2015
Dreamforce 2015
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Learn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentLearn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow Investment
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Vps server 3
Vps server 3Vps server 3
Vps server 3
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
The advantages of Cloud Application Control
The advantages of Cloud Application ControlThe advantages of Cloud Application Control
The advantages of Cloud Application Control
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
 

Semelhante a 10 alternatives to heavy handed cloud app control

EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidencePaul Richards
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceKeith Purves
 
5 must haves - cloud confidence
5 must haves - cloud confidence5 must haves - cloud confidence
5 must haves - cloud confidenceSean Dickson
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Daniel L. Cruz
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud softwareTCM infosys
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsAlex Zaltsman
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Tableau Software
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 

Semelhante a 10 alternatives to heavy handed cloud app control (20)

EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
5 must haves - cloud confidence
5 must haves - cloud confidence5 must haves - cloud confidence
5 must haves - cloud confidence
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Netskope Info
Netskope InfoNetskope Info
Netskope Info
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud software
 
Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platforms
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 

Mais de Aneel Mitra

Market Validation (Scale) (4).pdf
Market Validation (Scale) (4).pdfMarket Validation (Scale) (4).pdf
Market Validation (Scale) (4).pdfAneel Mitra
 
Many low, middle and high income workers get just four or five hours of rest ...
Many low, middle and high income workers get just four or five hours of rest ...Many low, middle and high income workers get just four or five hours of rest ...
Many low, middle and high income workers get just four or five hours of rest ...Aneel Mitra
 
Get over your fear of sales
Get over your fear of salesGet over your fear of sales
Get over your fear of salesAneel Mitra
 
Can big data reinvent the credit score?
Can big data reinvent the credit score?Can big data reinvent the credit score?
Can big data reinvent the credit score?Aneel Mitra
 
Can big data reinvent the credit score?
Can big data reinvent the credit score?Can big data reinvent the credit score?
Can big data reinvent the credit score?Aneel Mitra
 
Can big data reinvent the credit score?
Can big data reinvent the credit score?Can big data reinvent the credit score?
Can big data reinvent the credit score?Aneel Mitra
 
How to help your team overcome their doubts.
How to help your team overcome their doubts.How to help your team overcome their doubts.
How to help your team overcome their doubts.Aneel Mitra
 
How to help your team overcome their doubts.
How to help your team overcome their doubts.How to help your team overcome their doubts.
How to help your team overcome their doubts.Aneel Mitra
 
Are your co workers killing your productivity
Are your co workers killing your productivityAre your co workers killing your productivity
Are your co workers killing your productivityAneel Mitra
 
Are your co workers killing your productivity
Are your co workers killing your productivityAre your co workers killing your productivity
Are your co workers killing your productivityAneel Mitra
 
Are your co workers killing your productivity
Are your co workers killing your productivityAre your co workers killing your productivity
Are your co workers killing your productivityAneel Mitra
 
Are your co workers killing your productivity
Are your co workers killing your productivityAre your co workers killing your productivity
Are your co workers killing your productivityAneel Mitra
 
What new team leaders should do first
What new team leaders should do firstWhat new team leaders should do first
What new team leaders should do firstAneel Mitra
 
Trust databases to manage the complexity you can't
Trust databases to manage the complexity you can'tTrust databases to manage the complexity you can't
Trust databases to manage the complexity you can'tAneel Mitra
 
A perfect dose of pessimism
A perfect dose of pessimismA perfect dose of pessimism
A perfect dose of pessimismAneel Mitra
 
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...Aneel Mitra
 
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...Aneel Mitra
 
THE SIX TRAITS OF IT-DRIVEN BUSINESS INNOVATORS- Does Your Organization Share...
THE SIX TRAITS OF IT-DRIVEN BUSINESS INNOVATORS- Does Your Organization Share...THE SIX TRAITS OF IT-DRIVEN BUSINESS INNOVATORS- Does Your Organization Share...
THE SIX TRAITS OF IT-DRIVEN BUSINESS INNOVATORS- Does Your Organization Share...Aneel Mitra
 
Sales and Distribution approaches: Pros and Cons
Sales and Distribution approaches: Pros and ConsSales and Distribution approaches: Pros and Cons
Sales and Distribution approaches: Pros and ConsAneel Mitra
 

Mais de Aneel Mitra (20)

Market Validation (Scale) (4).pdf
Market Validation (Scale) (4).pdfMarket Validation (Scale) (4).pdf
Market Validation (Scale) (4).pdf
 
Many low, middle and high income workers get just four or five hours of rest ...
Many low, middle and high income workers get just four or five hours of rest ...Many low, middle and high income workers get just four or five hours of rest ...
Many low, middle and high income workers get just four or five hours of rest ...
 
Get over your fear of sales
Get over your fear of salesGet over your fear of sales
Get over your fear of sales
 
Can big data reinvent the credit score?
Can big data reinvent the credit score?Can big data reinvent the credit score?
Can big data reinvent the credit score?
 
Can big data reinvent the credit score?
Can big data reinvent the credit score?Can big data reinvent the credit score?
Can big data reinvent the credit score?
 
Can big data reinvent the credit score?
Can big data reinvent the credit score?Can big data reinvent the credit score?
Can big data reinvent the credit score?
 
How to help your team overcome their doubts.
How to help your team overcome their doubts.How to help your team overcome their doubts.
How to help your team overcome their doubts.
 
How to help your team overcome their doubts.
How to help your team overcome their doubts.How to help your team overcome their doubts.
How to help your team overcome their doubts.
 
Are your co workers killing your productivity
Are your co workers killing your productivityAre your co workers killing your productivity
Are your co workers killing your productivity
 
Are your co workers killing your productivity
Are your co workers killing your productivityAre your co workers killing your productivity
Are your co workers killing your productivity
 
Are your co workers killing your productivity
Are your co workers killing your productivityAre your co workers killing your productivity
Are your co workers killing your productivity
 
Are your co workers killing your productivity
Are your co workers killing your productivityAre your co workers killing your productivity
Are your co workers killing your productivity
 
What new team leaders should do first
What new team leaders should do firstWhat new team leaders should do first
What new team leaders should do first
 
Trust databases to manage the complexity you can't
Trust databases to manage the complexity you can'tTrust databases to manage the complexity you can't
Trust databases to manage the complexity you can't
 
A perfect dose of pessimism
A perfect dose of pessimismA perfect dose of pessimism
A perfect dose of pessimism
 
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
 
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
Aligning Strategy & Sales. It's time to address the enormous cost of the Stra...
 
THE SIX TRAITS OF IT-DRIVEN BUSINESS INNOVATORS- Does Your Organization Share...
THE SIX TRAITS OF IT-DRIVEN BUSINESS INNOVATORS- Does Your Organization Share...THE SIX TRAITS OF IT-DRIVEN BUSINESS INNOVATORS- Does Your Organization Share...
THE SIX TRAITS OF IT-DRIVEN BUSINESS INNOVATORS- Does Your Organization Share...
 
Risk driven
Risk driven Risk driven
Risk driven
 
Sales and Distribution approaches: Pros and Cons
Sales and Distribution approaches: Pros and ConsSales and Distribution approaches: Pros and Cons
Sales and Distribution approaches: Pros and Cons
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

10 alternatives to heavy handed cloud app control

  • 1. “Allow is the New Block” in Action: 10 Alternatives to Heavy-Handed Cloud App Control
  • 2. ALLOW IS THE NEW BLOCK 1 “Allow is the New Block” “Allow is the New Block” is a philosophy we live by at Netskope. It encapsulates our view on cloud enablement and reflects our product capabilities. But it’s more than just a glib catch- phrase. We believe in it and there’s real meaning and substance behind it. For as long as the term “Shadow IT” has existed, technology vendors have encouraged IT professionals to uncover unsanctioned IT in their organizations so they can block it. And if you think about things from a purely security-oriented point-of-view, blocking makes a lot of sense. But we, and our customers, are taking a different tack. Our point of view is that blocking any useful technology doesn’t work and ultimately does the IT organization and the business a disservice. Cloud apps like Box, Dropbox, Jira, NetSuite, and Workday help people get their jobs done more efficiently and flexibly, and people will always find ways to use cloud apps, even if it means going outside of enterprise policy. Our view is that with a little diligence, the right data, and the ability to enforce policy in a very precise manner, enterprise IT can eliminate the catch-22 of enabling the cloud while protecting the enterprise. By looking closely at cloud app usage, using granular policies to shape behavior, and using data to have a conversation with users and lines of business, they are eschewing heavy-handed controls for a more nuanced and effective approach. 10 Alternatives to Heavy-Handed Cloud App Controls Below are ten best practices we generalize from the thoughtful and creative approach our customers are taking. 1. Evaluate app risk After discovering cloud apps in their environment, many of our customers evaluate the risk of those apps. They use the Netskope Cloud Confidence Index™ (CCI) to give them an enterprise-readiness score based on objective criteria. For a low-confidence app, they then evaluate the app based on how it is used in the enterprise. Is it used for high-value or mission-critical activities or does it handle sensitive data? If so, they may limit certain activities in the app or partner with the business to select a less-risky app that offers similar functionality. If not, they may simply let the app continue and monitor it closely. This is especially important for the apps they don’t procure or administer, but are still broadly used in the enterprise. 2. Monitor usage Many of our customers go beyond discovering cloud apps to understand what people are doing in them. One Netskope customer in the media industry employs a usage framework to evaluate the scope, business case, and risk of the app. IT measures app user counts and usage volume
  • 3. ALLOW IS THE NEW BLOCK 2 to ascertain scope. For heavily-used apps, they identify activities (e.g., sharing, downloading, and editing), and build a business case to either support the app or, in the case of app overlap, suggest consolidation. Finally, they look at usage through a risk lens, assigning each activity a risk level. When they find an app in which users are performing high-risk activities, they set a policy blocking the risky activity. 3. Look for anomalies The above example highlights the importance of looking at behaviors within apps, not just the presence of an app. Some questions our customers ask when they use our solution is: What is the usage baseline of this app, and are there spikes in usage or activity? Are there more sessions than normal in a given time period? Excessive downloading? People logging in from locations they shouldn’t be, or from two locations at once? These behaviors can signal risky behavior or even an external attack. 4. Block an activity, not an app Some technology vendors encourage IT to uncover unsanctioned apps so they can shut them down. This sledgehammer approach rarely works and pits IT against the business in a negative way. Rather than block an app wholesale, several of our customers analyze the activities within the apps that represent the most risk (e.g., downloading to a mobile device, sharing with someone outside of the company) and block them. This lets them shape the activity to mitigate risk. Key to this is that they do this for not just the apps they manage but especially for the ones they don’t. 5. Protect data in context Adopters of data leakage prevention solutions – or any detection technologies for that matter – know full well that too many false positives erode the value of a solution. As our customers think about cloud data loss prevention, they are being smart about context. Rather than just detect patterns or key words, they are using Netskope to define granular contextual situations incorporating user, group, app category, location, device, and activity (such as upload or share) that help narrow the scope of where a data breach is likely to occur. This helps them increase their accuracy when they do apply data loss prevention techniques such as blocking or encrypting.
  • 4. ALLOW IS THE NEW BLOCK 3 6. Have a conversation One of our e-commerce customers needs to keep a close eye on PCI DSS compliance. But they also have an enabling philosophy when it comes to cloud apps. So, when IT finds an app that does not facilitate PCI compliance or identifies a behavior within an app that could hurt their compliance status, they learn how the app is being used, come up with a few options to improve their compliance status, and then have a conversation about it with the user or line of business. Tapping someone on the shoulder and having a data-driven conversation increases the chance of an optimal outcome for both IT and the business. 7. Provide alternatives One of our healthcare customers is all about coming to the conversation not just with data, but with alternatives. They use the CCI to identify apps that have similar features and functionality to riskier ones the business may be using. In the conversation, IT points out why the apps in use put the business at risk (e.g., poor auditability or lack of HIPAA compliance) and offer choices that have a higher confidence score. This positions IT as a problem-solver and increases the chances that users will solicit IT’s input before procuring a cloud app the next time around. 8. Trust but verify One of our media customers is reluctant to put onerous policies in place. Their culture centers on trusting people, and their risk profile enables them to make the tradeoff of permissiveness with potential data leakage. They balance this by auditing cloud app usage on a periodic basis as well as setting watch lists for particular behaviors that can signal a potential data breach or malicious activity. 9. Do forensics in the cloud In addition to cloud audits, several of our customers perform forensic analysis after a suspected breach. In one example, a departing employee of one of our customers stole proprietary content to take to a competitor. IT identified the data breach as well as the events leading up to it, giving the company enough evidence to approach the competitor and recover the content. As a result of the accurate, thorough forensic audit trail, the employee in question lost his job not only at our customer, but also at the competitor.
  • 5. ALLOW IS THE NEW BLOCK 4 10. Get specific Many of the above examples point to the benefit of specificity. Our customers are running analytics and setting policies based on combinations of app, category, user, group, location, device, OS, browser, time, app confidence score, activity, and content. This specificity allows them to, for example, be alerted when people in Investor Relations share content from a cloud app during the company’s quiet period, block downloads of sensitive documents to mobile devices, prevent HR employees from accessing salary data outside of work, and limit content uploads for people in Germany to apps hosted in the United States. The above are ways our customers are taking a lean-forward approach to cloud adoption and enablement while also mitigating risk and keeping their businesses compliant with their policies. What’s cool is not one of the ten examples above includes an outright “no” to a cloud app. While some of our customers conclude that blocking an app is the right approach, it is with the right usage data, the right information about app risk, and the granularity to shape usage with a fine scalpel versus a sledgehammer. ABOUT NETSKOPE Netskope is the cloud app analytics and policy company. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility and enforcing sophisticated policies in cloud apps. Netskope performs deep analytics and lets decision-makers create policies in a few clicks that protect corporate data and optimize cloud app usage in real-time and at scale. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence. ©2014 Netskope, Inc. All rights reserved. 4984 El Camino Real, Suite 102, Los Altos, CA 94022 Netskope is a registered trademark and Cloud Confidence Index and SkopeSights are trademarks of Netskope, Inc. All other trademarks are trademarks of their respective holders. 1/14 SB-8-1