Quantify the value of Netskope One SSE – Get the 2024 Forrester Total Economic Impact™ study

fechar
fechar
  • Por que Netskope divisa

    Mudando a forma como a rede e a segurança trabalham juntas.

  • Nossos clientes divisa

    A Netskope atende a mais de 3.400 clientes em todo o mundo, incluindo mais de 30 das empresas da Fortune 100

  • Nossos parceiros divisa

    Fazemos parceria com líderes de segurança para ajudá-lo a proteger sua jornada para a nuvem.

Líder em SSE. Agora é líder em SASE de fornecedor único.

Descubra por que a Netskope estreou como líder no Quadrante Mágico™ do Gartner® para Single-Vendor SASE

Obtenha o Relatório
Destaques de clientes visionários

Leia como os clientes inovadores estão navegando com sucesso no cenário atual de mudanças na rede & segurança por meio da plataforma Netskope One.

Baixe o eBook
Destaques de clientes visionários
A estratégia de comercialização da Netskope, focada em Parcerias, permite que nossos Parceiros maximizem seu crescimento e lucratividade enquanto transformam a segurança corporativa.

Saiba mais sobre os parceiros da Netskope
Grupo de diversos jovens profissionais sorrindo
Sua Rede do Amanhã

Planeje seu caminho rumo a uma rede mais rápida, segura e resiliente projetada para os aplicativos e usuários aos quais você oferece suporte.

Receba o whitepaper
Sua Rede do Amanhã
Netskope Cloud Exchange

O Cloud Exchange (CE) da Netskope oferece aos clientes ferramentas de integração poderosas para tirar proveito dos investimentos em estratégias de segurança.

Saiba mais sobre o Cloud Exchange
Vista aérea de uma cidade
  • Security Service Edge divisa

    Proteger-se contra ameaças avançadas e com nuvens e salvaguardar os dados em todos os vetores.

  • SD-WAN divisa

    Confidentemente, proporcionar acesso seguro e de alto desempenho a cada usuário remoto, dispositivo, site, e nuvem.

  • Secure Access Service Edge divisa

    O Netskope One SASE oferece uma solução SASE nativa da nuvem, totalmente convergente e de fornecedor único.

A plataforma do futuro é a Netskope

Security Service Edge (SSE), Cloud Access Security Broker (CASB), Cloud Firewall, Next Generation Secure Web Gateway (SWG), and Private Access for ZTNA built natively into a single solution to help every business on its journey to Secure Access Service Edge (SASE) architecture.

Vá para a plataforma
Vídeo da Netskope
Next Gen SASE Branch é híbrida — conectada, segura e automatizada

Netskope Next Gen SASE Branch converge o Context-Aware SASE Fabric, Zero-Trust Hybrid Security e SkopeAI-Powered Cloud Orchestrator em uma oferta de nuvem unificada, inaugurando uma experiência de filial totalmente modernizada para empresas sem fronteiras.

Saiba mais sobre Next Gen SASE Branch
Pessoas no escritório de espaço aberto
SASE Architecture For Dummies (Arquitetura SASE para leigos)

Obtenha sua cópia gratuita do único guia de planejamento SASE que você realmente precisará.

Baixe o eBook
Livro eletrônico SASE Architecture For Dummies (Arquitetura SASE para leigos)
Mude para serviços de segurança na nuvem líderes de mercado com latência mínima e alta confiabilidade.

Conheça a NewEdge
Rodovia iluminada através de ziguezagues na encosta da montanha
Permita com segurança o uso de aplicativos generativos de IA com controle de acesso a aplicativos, treinamento de usuários em tempo real e a melhor proteção de dados da categoria.

Saiba como protegemos o uso de IA generativa
Ative com segurança o ChatGPT e a IA generativa
Soluções de zero trust para a implementação de SSE e SASE

Conheça o Zero Trust
Passeio de barco em mar aberto
Netskope obtém alta autorização do FedRAMP

Escolha o Netskope GovCloud para acelerar a transformação de sua agência.

Saiba mais sobre o Netskope GovCloud
Netskope GovCloud
  • Recursos divisa

    Saiba mais sobre como a Netskope pode ajudá-lo a proteger sua jornada para a nuvem.

  • Blog divisa

    Saiba como a Netskope permite a transformação da segurança e da rede por meio do serviço de acesso seguro de borda (SASE)

  • Eventos e workshops divisa

    Esteja atualizado sobre as últimas tendências de segurança e conecte-se com seus pares.

  • Security Defined divisa

    Tudo o que você precisa saber em nossa enciclopédia de segurança cibernética.

Podcast Security Visionaries

Previsões para 2025
Neste episódio de Security Visionaries, temos a companhia de Kiersten Todt, presidente da Wondros e ex-chefe de gabinete da Agência de Segurança Cibernética e de Infraestrutura (CISA), para discutir as previsões para 2025 e além.

Reproduzir o podcast Navegue por todos os podcasts
Previsões para 2025
Últimos blogs

Leia como a Netskope pode viabilizar a jornada Zero Trust e SASE por meio de recursos de borda de serviço de acesso seguro (SASE).

Leia o Blog
Nascer do sol e céu nublado
SASE Week 2024 On-Demand

Aprenda a navegar pelos últimos avanços em SASE e confiança zero e explore como essas estruturas estão se adaptando para enfrentar os desafios de segurança cibernética e infraestrutura

Explorar sessões
SASE Week 2024
O que é SASE?

Saiba mais sobre a futura convergência de ferramentas de redes e segurança no modelo predominante e atual de negócios na nuvem.

Saiba mais sobre a SASE
  • Empresa divisa

    Ajudamos você a antecipar os desafios da nuvem, dos dados e da segurança da rede.

  • Carreira divisa

    Join Netskope's 3,000+ amazing team members building the industry’s leading cloud-native security platform.

  • Customer Solutions divisa

    Estamos aqui junto com você a cada passo da sua trajetória, assegurando seu sucesso com a Netskope.

  • Treinamento e credenciamentos divisa

    Os treinamentos da Netskope vão ajudar você a ser um especialista em segurança na nuvem.

Apoiando a sustentabilidade por meio da segurança de dados

A Netskope tem o orgulho de participar da Visão 2045: uma iniciativa destinada a aumentar a conscientização sobre o papel da indústria privada na sustentabilidade.

Saiba mais
Apoiando a sustentabilidade por meio da segurança de dados
Ajude a moldar o futuro da segurança na nuvem

Na Netskope, os fundadores e líderes trabalham lado a lado com seus colegas, até mesmo os especialistas mais renomados deixam seus egos na porta, e as melhores ideias vencem.

Faça parte da equipe
Vagas na Netskope
Netskope dedicated service and support professionals will ensure you successful deploy and experience the full value of our platform.

Ir para Soluções para Clientes
Netskope Professional Services
Proteja sua jornada de transformação digital e aproveite ao máximo seus aplicativos de nuvem, web e privados com o treinamento da Netskope.

Saiba mais sobre Treinamentos e Certificações
Grupo de jovens profissionais trabalhando

SASE and the Forces Shaping Digital Transformation Part 3: Government and Industry Regulations, and Global Social and Economic Forces

Nov 18 2020

Force 5: Government and Industry Regulations

Regulatory authorities are still trying to catch up with cloud computing let alone the revolution that business digitalization is causing as there is no longer a data center to audit or a firewall log to review. 

Cloud Impact on Regulations

As the cloud reduces physical perimeters for organizations, the cloud also reduces and blurs the digital divide between countries and nations. For many organizations, knowing where their data is located should be a fundamental requirement, yet for many, it’s not always obvious. Responding to a government or a regulator request that our data “is in the cloud” is not perhaps the correct response. Instead, the regulator has made it clear in recent data protection law revisions, such as the EU GDPR, that organizations must know where their data is located. It is a legal requirement and as we see updated regulations introduced across the globe, this requirement will be mandatory for most organizations.

Geolocation Impact on Regulations

Not only is geolocation of the data a requirement but also an understanding of why the organization has this data, how long they can retain, what organizational and security controls are required, and what agreements are in place to transfer this data cross-border to other data controllers and data processors. These are all questions the organization should be able to easily answer. As we see a consolidation of these requirements, we also see an acceleration in consumers being aware of their rights under new data protection and privacy Laws. GDPR, LGPD, CCPA, and POPIA are just some national or state examples whereby the national authorities have made it clear that consumer data protection is critical and they are willing to take action against even the largest organizations that do not take their obligations seriously.

Across the globe, countries and unions have applied aggressive mandates to control and protect data in and out of the country. For these countries, cross border connectivity must be controlled with organizations relying on valid agreements to be in place. The complexity of the rules in place continues to impact both global data protection and security teams that need visibility and control over their network and systems and to not run foul of these laws. For many of these laws, there is no simple answer as rules and guidelines continue to be developed to best support the government’s intentions to support both their economy and their trade arrangements.

Recommendations to best manage these regulatory minefields include mapping the organizational data flows to truly understand where your organization may need to deal with these issues before they negatively impact the organization. Understanding where employees connect from and to cloud services, as an example, will help with maintaining a cross-border inventory of the locations that may need additional control and/or analysis. Sharing this information will provide greater visibility across the whole organization and can help support legal, risk, and audit teams in their understanding of the requirements. Building a strong coalition alongside the security team that factors into the location variable that cloud computing brings is a good first step to manage these forces.

Force 6: Global Social and Economic Forces 

A security strategy should also be implemented to be aware of outside influences, such as global social and economic forces. Employees may not always give a second thought to these forces that may influence their favorite collaboration application. How would they know that they are using storage where the provider has terms that allow for this data to be used for secondary purposes? It is so easy to sign up for a new application completely unaware of the potential ramifications. Another aspect is the use of this data to train existing algorithms that can be used to enhance an understanding of behavior. All good vendor assurance and third-party risk assessments should uncover the potential of this, however, if the organization has embraced an acceptance of shadow IT, who is responsible for these checks and balances?  These forces and influences should be considered and embedded into a strategy focusing on protecting both the employees from misguided information and to protect the organization from potentially losing value from their data.

The Shift in Security Budgets

The movement to cloud applications is also having a major impact on investment dollars of security budgets.  By 2024 investments in cloud security will shift from the current ~20% of the budget to over ~60% of the security budget. Major investments will be moving away from on-premise appliance-based Secure Web Gateways (SWG) to software-based Next Generation SWGs that combine the functionality of data leakage prevention (DLP), web security, and Cloud Access Security Broker (CASB) into one platform. When implemented inline, the technologies can monitor and protect the information flowing to and from all critical business systems.  

Global Events

Often global events will impact the security strategy in unforeseen ways.  The COVID-19 virus made almost every business continuity plan obsolete. Prior to COVID-19, if you went to your executive team and said “I want to create a plan with enough secure network capacity, and mobile endpoint security to allow for the entire workforce to go remote all at once” you would have been laughed out of the office. Now that a global remote workforce is a reality, better security organizations are ramped up from a capacity perspective and quickly redoing their network and endpoint security control structures to enable visibility and control for their remote workers.

Gig Economy

Outside of the pandemic, the economic forces have been changing for the past few years since the last financial crisis. Organizations have seen the rise and value of the gig economy which is based on flexible, temporary, and/or freelance workers that utilize technology and platforms to deliver projects and digital transformation. In the U.S, it’s estimated that over half (53%) of Generation Z workers are freelancers, a number that is projected to grow in the next 5 years across all generations (Source: UpWork). With this growth in mind, organizations are moving away from traditional types of business processes to be more open and flexible and will expect a greater collaboration of tools and technology between permanent and freelance employees.  

This move will push security teams to better understand and deal with a dynamic workforce whereby behaviors will need to be aligned and monitored. Gone are the days of spending time with a permanent team and providing security education and raising security awareness.  Instead, more agile and real-time security awareness training is required that can educate an employee or a freelancer when they make a decision that introduces a high level of risk to the organization. This form of education strengthens the approach and allows for the flexibility of supporting a workforce that could change monthly, weekly, or even daily without damaging their productivity.

Trade Wars and National Conflicts Impact on Security Strategy

The security strategy is also impacted by trade wars and national conflicts. It is not uncommon to see an increase in cyberattacks during and immediately following a trade war or national conflict. In recent history, we have seen this in action in Asia and the Middle East. Shortly after the national event, a significant increase in cyber-attacks followed.  

Whilst preparing for the next event, better security organizations are tracking national events and then adjusting their kill chain analysis, threat watch, and monitoring rules to prepare for and react to the next potential threat. Considerations should be made to the supply chain as although most organizations may not be the direct target, a disruption in the supply chain could have the same effect. Understanding which services your organization consumes and for what purpose and understanding the needs of your organization to supply goods and services to your customers is key.

Want to learn more about the remaining forces? You can read Part 1 here and Part 2 here.

While it is true that 2020 has changed the landscape of cloud security, Netskope was purpose-built for SASE. Let us show you why during our SASE Week! Click here for more information!

author image
James Christiansen
James Christiansen is Netskope’s VP of cloud security transformation and leader of the Global Chief Strategy Office. He is focused on enhancing Netskope’s global clients.
James Christiansen is Netskope’s VP of cloud security transformation and leader of the Global Chief Strategy Office. He is focused on enhancing Netskope’s global clients.

Mantenha-se informado!

Subscribe for the latest from the Netskope Blog