Subscribe
  • Home
  • /
  • Security
  • /
  • Netskope introduces first complete threat protection, remediation solution for enterprise cloud apps

Netskope introduces first complete threat protection, remediation solution for enterprise cloud apps

Leading cloud security company unveils new capabilities and integrations with industry-leading tools to offer defence-in-depth solution targeted at cloud threats.


Johannesburg, 07 Mar 2016

Netskope, the leading cloud access security broker, announced the availability of Netskope Active Threat Protection, a first-of-its-kind threat protection solution for the cloud access security broker (CASB) industry.

With a comprehensive vantage point over cloud app usage, Netskope Active Threat Protection combines threat intelligence, static and dynamic analysis, and machine-learning based anomaly detection to enable real-time detection, prioritised analysis, and remediation of threats that may originate from or be further propagated by cloud apps. These new Netskope capabilities integrate with industry-leading tools to create a defence-in-depth solution that reduces the time required for cloud threat detection and forensic analysis from hours to minutes.

With 4.1% of enterprises' sanctioned cloud apps laced with malware and total cloud app usage, including unsanctioned or "shadow IT" apps extending into the thousands per enterprise, organisations have been largely unprotected by traditional perimeter security providers. The increasing complexity of the threat landscape and frequency of attacks has also led to an unprecedented shortage of skills and cognitive overload for IT security professionals.

Netskope Active Threat Protection addresses the lack of cloud visibility, with a 360-degree view into sanctioned and unsanctioned cloud app usage, even if the user is accessing the app remotely or from a mobile device. This vantage point over the cloud vector goes beyond other CASB solutions that fail to see all app usage and data movement. Netskope Active Threat Protection goes even further, by understanding the context of the usage, such as who is uploading, downloading and sharing data information that may prove critical when thwarting an attack or limiting its blast radius.

To help IT address the complexity of the threat landscape and skills shortage, Netskope Active Threat Protection is designed to prioritise potential threat dangers during scanning, without sacrificing the comprehensiveness of the scans performed. This is done at high-speed and in real-time, before surfacing forensic analysis in a single Netskope dashboard or via a customer's security information and event management (SIEM) solution. To expedite or automate remediation efforts, Netskope Active Threat Protection comes with a granular policy enforcement engine and can trigger workflows such as quarantining, or a customer can integrate with their existing remediation toolset.

Key features of Netskope Active Threat Protection include:

* 360-degree cloud vantage point: Netskope Active Threat Protection offers a 360-degree view into sanctioned and unsanctioned apps, distilled into users, activity and context, all in one central dashboard.
* Prioritised threat protection: Industry-first prioritised threat protection provides deep contextual-based insights from threat intelligence, static and dynamic analysis and anomaly detection, to detect, analyse, and quarantine the latest viruses, advanced persistent threats (APTs), spyware, adware, worms, ransomware, and other malware.
* Remediation built for the cloud: Netskope Active Threat Protection leverages the Netskope policy enforcement capabilities along with cloud-specific integrations with endpoint detection and response (EDR), sandbox and SIEM vendors so that the time required for forensics is reduced from hours to minutes.

Netskope Active Threat Protection also integrates with leading IT security vendors to provide best-of-breed capabilities and extend existing enterprise investments:

* Threat intelligence feed aggregation and sharing: Netskope Active Threat Protection automatically aggregates and normalises threat intelligence feeds to increase threat detection. In addition, as a participant in the FireEye Cyber Security Coalition, Netskope integrates with the FireEye platform to share intelligence. Finally, Netskope Active Threat Protection communicates using STIX/TAXII or OpenIOC standards to exchange threat context and detection information, and Netskope customers can easily leverage existing threat intelligence aggregations that they have built over time.
* Zero-day threat intelligence:Zero-day intelligence feeds from FireEye ensure Netskope Active Threat Protection detects and protects against the latest threats.
* Sandboxing:Netskope Active Threat Protection provides certified integrations with FireEye and Cyphort. Additional sandboxing providers can be leveraged through pre-built integrations.

* Endpoint intelligence and incident response:Netskope Active Threat Protection integrates out-of-the-box with the Carbon Black EDR solution. The integration is bidirectional; endpoint behavioural data is pulled into the Netskope platform, where it is analysed against user, activity, and content data. Netskope cloud app policies can also be pushed to the EDR for seamless remediation.

Share

Netskope

Netskope, the leading cloud access security broker (CASB), helps enterprises find, understand and secure sanctioned and unsanctioned cloud apps. Through contextual awareness and a multi-mode architecture, Netskope sees the cloud differently. This results in the deepest visibility and control, the most advanced threat protection and data loss prevention and an unmatched breadth of security policies and workflows. The world's largest companies choose Netskope, the only CASB that ensures compliant use of cloud apps in real-time, whether accessed on the corporate network, remotely or from a mobile device. With Netskope, enterprises move fast, with confidence.

Private Protocol

Private Protocol is a data security provider offering solutions and strategies that cover mobile device and information security, secure data collaboration, SharePoint/O365 security and compliance, data classification, file share security and compliance, Web content compliance, data leakage prevention, endpoint security and cloud security. Private Protocol also offers data risk assessments, so companies can understand where their data resides, where their data is going, who is using it and what devices are connecting to the network. Private Protocol covers Africa and Indian Ocean Islands and also has a distributed partner channel.

Web site: www.privateprotocol.com

Editorial contacts