Netskope vuelve a ser reconocido como Líder en el Cuadrante™ Mágico de Gartner® para plataformas SASE. Obtener el Informe

cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Ponte manos a la obra con la plataforma Netskope
          Esta es su oportunidad de experimentar de primera mano la Netskope One plataforma de una sola nube. Regístrese para participar en laboratorios prácticos a su propio ritmo, únase a nosotros para una demostración mensual del producto en vivo, realice una prueba de manejo gratuita de Netskope Private Accesso únase a nosotros para talleres en vivo dirigidos por instructores.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope ha sido reconocido como Líder con mayor visión tanto en plataformas SSE como SASE
            2X líder en el Cuadrante Mágico de Gartner® para SASE Plataforma
            Una plataforma unificada creada para tu viaje
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Descubra cómo su organización puede equilibrar el potencial innovador de la IA generativa con sólidas prácticas de seguridad de Datos.
                Prevención de pérdida de datos (DLP) moderna para dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Obtenga consejos y trucos para la transición a una DLP entregada en la nube.
                  Libro SD-WAN moderno para principiantes de SASE
                  SD-WAN moderna para maniquíes SASE
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforma la forma en que los equipos de operaciones de seguridad aplican los conocimientos basados en datos para implementar una mejor política. Con Advanced Analytics, puede identificar tendencias, concentrarse en las áreas de preocupación y usar los datos para tomar medidas.
                        Soporte técnico Netskope
                        Soporte técnico Netskope
                        Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                          Vídeo de Netskope
                          Netskope Training
                          La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                            5 tips for using a CASB to safely enable social media in your business

                            Jul 25 2016
                            Tags
                            CASB
                            Cloud Best Practices
                            Cloud Security
                            Tools and Tips

                            From Facebook’s 1.65 billion monthly active users to Twitter’s rise as a mainstream broadcast media outlet, social media continues to experience rapid and wide adoption from users around the globe. For the enterprise, social media presents both opportunities and challenges. The opportunity is primarily centered around leveraging social to make your employees more collaborative and productive at their job, not to mention the many benefits to the business. If you aren’t interacting with your customers via social media, there is a good chance that your competitors are.

                            Even with all the upside, there are a number of challenges that are impacting the adoption of social media in the enterprise. First, social media promotes transparency and some businesses are not ready to change their culture overnight. The other challenge is the risk associated with sensitive data leaking via social media. What if someone posts or shares something they are not supposed to? What would be the impact to our company if intellectual property was leaked, customer data exposed, or out-of-compliance activities took place? Compliance is a real issue whether it is FINRA compliance for financial firms, PCI for retail, or protected health information (PHI) that is connected to HIPAA compliance. Social media makes it very easy to share anything and that anything could be cause for concern depending on the scope of your business.

                            The question is, do you embrace social media in your place of business and reap all the benefits or do you block social media altogether? This is the catch-22 as you ultimately need to make the decision between using social or being safe. What if you could enable the use of social media in your business, but do it safely? I want to share with you how a cloud access security broker (CASB) such as Netskope can let you have your cake and eat it too. Here are 5 tips.

                            Tip #1 Use a scalpel, not a sledgehammer

                            Your first inclination might be to just outright block social media by using your perimeter security device. Instead, use a CASB that can identify and block risky activities taking place in real-time. A risky activity could be someone from the hospital staff posting PHI to a social media app of their choice. Focusing on the risky activity instead of being forced to block the app outright means that everyone can use the app safely.

                            Tip #2 Implement a category-level policy

                            There are the mainstream social media apps like Facebook, Twitter, LinkedIn, and Snapchat and then there are the dozens or potentially hundreds of social media apps that could be in use by users. In fact, a recent Netskope Cloud Report found that an enterprise has 23 social media apps in use on average. Make sure that your CASB supports a category-level policy that can administered to cover all social media apps. The last thing you want to do is create and manage dozens of policies individually.

                            Tip #3 Don’t be blind. Cover all ways social is being used

                            There are two primary ways that users interact with social media apps. First is the browser from their Mac to PC and the other way is from an app on their iOS or Android device. Make sure that your CASB can inspect social media usage involving both browsers and mobile apps. If you can’t cover mobile apps then you are leaving yourself vulnerable.

                            Tip #4 Incorporate advanced DLP into your policy

                            This is tied to the scalpel approach covered in tip #1. The key here is that you need to be able to inspect not only attachments and text that is part of a social media post or share, but you need to do it in a smart way so you don’t end up with a ton of false positives and end of blocking everything. The example I like to use is a financial services company that wanted to safely enable social media, but at the same time be FINRA compliant. This involved looking for keywords such as “guarantee” or “recommend” combined with public company names and stock symbols. This requires that your CASB have an advanced cloud DLP solution with AND/OR rules, custom keyword dictionaries, proximity, and other key features. You can learn more about this use case by watching this demo video.

                            Tip #5 Coach users

                            The final tip is focused on end user experience and behavior modification. A successful enterprise social media strategy involves training users to use their best judgement. This traditionally involves training classes, email reminders, and even getting users to sign agreements. You can take this a step further by using a CASB to implement real-time coaching and have custom messages pop up when the user performs an out-of-compliant action. When they attempt to do something risky, warn them in real-time and coach them to do the right thing.

                            Speaking of social media, I would love to connect with you on Twitter. You can follow me @bobegilbert

                            author image
                            Bob Gilbert
                            As Vice President of Strategy and Chief Evangelist at Netskope, Bob is dedicated to helping clients transform their security and networking infrastructure.
                            As Vice President of Strategy and Chief Evangelist at Netskope, Bob is dedicated to helping clients transform their security and networking infrastructure.
                            Conéctese con Netskope

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.