32
Making Shadow IT Work

Netskope — Shadow IT Is A Good Thing

Embed Size (px)

DESCRIPTION

Shadow IT is often used in a derogatory manner, but what if the apps and services a company's employees are bringing into the enterprise were actually the secret to their success? What if the efficiency and productivity gains your company is experiencing are owed, in part, to these apps that IT isn't responsible for sourcing and enabling? In this presentation Netskope discusses the challenges and opportunities that come from the use of rogue apps in the enterprise and how IT can turn the corner and end the catch-22 between enablement and security.

Citation preview

Page 1: Netskope — Shadow IT Is A Good Thing

Making Shadow IT Work

Page 2: Netskope — Shadow IT Is A Good Thing

Dear ,

I love you, I hate you.

Regards,The CIO

Page 3: Netskope — Shadow IT Is A Good Thing
Page 4: Netskope — Shadow IT Is A Good Thing

CLOUD CAGR FOR ‘13-’17 WILL BE 5XOF IT INDUSTRY AS A WHOLE

Page 5: Netskope — Shadow IT Is A Good Thing

ORGANIZATIONS ARE PUTTING THECLOUD TO WORK FOR BUSINESS

Page 6: Netskope — Shadow IT Is A Good Thing

Who?

What?

When?

with Whom?

Page 7: Netskope — Shadow IT Is A Good Thing

unsanctioned CLOUD APPS 72%

* OneLogin Survey 2012

of people admit to using

Page 8: Netskope — Shadow IT Is A Good Thing

of CLOUD APPS don’t make the grade

75% Cloud App

Cloud App

Cloud App

Cloud App

REPORT CARD

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 9: Netskope — Shadow IT Is A Good Thing

Evaluating Apps on Objective Criteria

• Measure of a cloud app’s enterprise-readiness• Based on the app’s security, auditability, and

business continuity• Based on 30+ objective criteria adapted from the

Cloud Security Alliance

EXCELLENT HIGH MEDIUM LOW POOR

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 10: Netskope — Shadow IT Is A Good Thing

1%

22%34%16%27%

EXCELLENT

HIGH

MEDIUM

LOW

POOR

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 11: Netskope — Shadow IT Is A Good Thing

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 12: Netskope — Shadow IT Is A Good Thing

Reasons Apps Do Well and Fall Short

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 13: Netskope — Shadow IT Is A Good Thing

* Netskope Research, Adapted from CSA’s Cloud Controls Matrix

Page 14: Netskope — Shadow IT Is A Good Thing

Example: User and Admin Audit• Admin audit logs• Change/upgrade notifications• Data access logs• Infrastructure status reports• User audit logs

Page 15: Netskope — Shadow IT Is A Good Thing

Example: Certifications and Compliance• Compliance certifications– HIPAA– PCIDSS– etc.

• Datacenter certifications– SOC-1, -2– ISO27001– etc.

Page 16: Netskope — Shadow IT Is A Good Thing

Key Capabilities• Audit and alert capabilities• Certifications and compliance• Data classification capabilities• Disaster recovery and business continuity• Encryption• File sharing• Policy enforcement and access control

Page 17: Netskope — Shadow IT Is A Good Thing

April 14, 202317

10%

90%

Most Organizations Underestimate

Cloud App Usage by 90%

Page 18: Netskope — Shadow IT Is A Good Thing

CLOUD HAS CREATED A BLIND SPOT

The average number of security

While the percent of people stating they “don’t know”

Source: PwC

In the past 2 years…

if they’ve had a security breach increased 100%

incidents has risen 25%

Page 19: Netskope — Shadow IT Is A Good Thing

The Multiplier Effect of a Cloud Breach

3.3 devices perknowledge worker

50% of people share content via unapproved cloud services

90% of organizationsthat lost sensitivecontent via file sharing

5 out of top 10 data breaches involved cloud

?Source: Cisco Source: Ponemon

Source: CRNSource: Ponemon

0100011 110 01 1

1010

Page 20: Netskope — Shadow IT Is A Good Thing

Cost of a data breach:

$5.4 million

Source: Ponemon

• Remediation costs• Brand and reputation impact• Loss of intellectual property• Fines for non-compliance• Cost and time for reporting and prevention

Page 21: Netskope — Shadow IT Is A Good Thing

Yet, people love their cloud apps, and for good

reasonAnywhere Access CollaborationProductivity

Page 22: Netskope — Shadow IT Is A Good Thing

CAN’T COMPLY WITH SOX, ETC.

• Public biosciences co. would like to embrace cloud, but doesn’t know what services are running

• Can’t evaluate new services

• Can’t attest to access/auth usage for SOX and other regs, e.g., HIPAA

Page 23: Netskope — Shadow IT Is A Good Thing

POTENTIAL DATA LEAKAGE

• Large media firm discovered a dozen cloud storage apps, plus others in which data could be shared

• IT must see what sensitive data are being uploaded

• Then, see whether data are being shared, and with whom

Page 24: Netskope — Shadow IT Is A Good Thing

POST-EVENT FORENSICS

• High tech company suspects theft of proprietary documents by a departing employee

• IT must construct audit trail, showing user download from corporate account and subsequent upload to and share from personal account

Page 25: Netskope — Shadow IT Is A Good Thing

DISCOVER APPS & EVALUATE RISK

• Discover all apps, known or not• Objectively evaluate apps’

enterprise-readiness • Score apps on security,

auditability, and business continuity

Page 26: Netskope — Shadow IT Is A Good Thing

ANALYZE USAGE

• Discover who’s using what apps, from where, and on what device

• See what class of data are being uploaded, downloaded, shared

• See with whom data are shared

Page 27: Netskope — Shadow IT Is A Good Thing

LIMIT ACTIVITIES VS. BLOCK APPS

• Rather than block an app, limit usage (e.g., don’t share with people outside of the company)

• Use context such as user, location, device, data class, and user activity

Page 28: Netskope — Shadow IT Is A Good Thing

VERIFY AND THEN TRUST

• Create risk model of scenarios involving user, app, data, activity, and other contextual factors

• Set watch lists on scenarios that represent the most risk

Page 29: Netskope — Shadow IT Is A Good Thing

CONSIDER CONTEXT IN EVERYTHING YOU

DO• Consider contextual factors when

shining a light on shadow IT, running analytics and setting policies

• Think about user, group, location, time, device, OS, app, and app score

Page 30: Netskope — Shadow IT Is A Good Thing

1. DISCOVER cloud apps and evaluate risk2. Analyze USAGE3. LIMIT activities vs. blocking apps4. VERIFY and then trust5. Consider CONTEXT in everything you do

Page 31: Netskope — Shadow IT Is A Good Thing
Page 32: Netskope — Shadow IT Is A Good Thing

THANK YOU