Upload
netskope
View
262
Download
1
Embed Size (px)
Citation preview
2016 © Netskope. All rights reserved. 2016 © Netskope. All rights reserved.
The Definitive CASB Business Case KitJamie Barnett, CISSP, SVP Cloud Intelligence
2016 © Netskope. All rights reserved.
Gartner’s Top 10 Information Security Technologies
2
#1
2016 © Netskope. All rights reserved. 3
But When Your Day Job Looks Like This, Who Has Time for “New Initiatives?”
2016 © Netskope. All rights reserved. 4
The DreadedBusiness Case
(cue dramatic music)
2016 © Netskope. All rights reserved. 5
First, Quantify Usage and Risk
2016 © Netskope. All rights reserved.
6
Actual:
977
IT estimate:
40-50
Source: Netskope Cloud Report
Cloud procurement happens outside of IT
It’s every line of business, every function, workgroup,
and person.
No visibility or control
2016 © Netskope. All rights reserved.
33 Percent Business Data in Cloud
7
one-thirdof it
“unknown”
2016 © Netskope. All rights reserved. 8
25 “ecosystem” apps on average per “anchor tenant” app or suite
2016 © Netskope. All rights reserved. 9
Nearly Halfof all cloud app activities originate from a mobile device
One Thirdof all DLP policy violations occur on a mobile device
2016 © Netskope. All rights reserved. 10
Risk = Assets x Vulnerabilities x Threats
ASSET
THREAT
VULNERABILITY
Data (cost of losing or leaking sensitive data)
Systems (cost of downtime of a business-critical system)
External (malware, data breach)
Technical (vulnerabilities, e.g., OpenSSL)
Non-technical (people, misconfigurations, share button)
(how this definition might look when it’s in the cloud)
Internal (data loss or exposure, system downtime)
2016 © Netskope. All rights reserved. 11
data leak
IP worth $50M Shared with design
collaborator
Who leaves company with
your data
2016 © Netskope. All rights reserved. 12
Then, Benchmark Against Others
2016 © Netskope. All rights reserved. 13
Next, Determine Your CASB Use Cases
VISIBILITY
DATA SECURITY
COMPLIANCE
THREAT PROTECTION
The Four Pillars of CASB
“CASB is a required security platform for organizations using cloud services.”
2016 © Netskope. All rights reserved. 14
Use Case 1: Visibility Use Case
• Discover apps• Assess enterprise-readiness• Calculate risk• Find compromised credentials,
malicious sites, TORs, anonymizers
2016 © Netskope. All rights reserved. 15
Use Case 2: Compliance Use Case
• GDPR – residency, privacy• PII – downloads from HR• SOX – data mods in finance• PCI – shares of PCI• NERC/FERC – data upload
2016 © Netskope. All rights reserved. 16
Use Case 3: Data Security Use Case
• Protect confidential data in sanctioned apps, e.g., O365
• Prevent IP upload to unsanctioned apps
• Encrypt sensitive data at rest and en route
2016 © Netskope. All rights reserved. 17
• Block or remediate malware in sanctioned/unsanctioned
• Detect and remediate ransomware• Share threat intelligence with
EDR/sandbox
Use Case 4: Threat Protection Use Case
2016 © Netskope. All rights reserved. 18
Quantify ROI Based on Those Use Cases(Customer Sample. Values Vary by Enterprise.)
VISIBILITY DATA SECURITYCOMPLIANCE THREAT
PROTECTION
Avoidance offailed audits
Avoidance of non-compliance
Assessment of existing apps
Assessment of new
apps
Automation of log collection and
review
Consolidation of redundant apps
$605,000 $10,495,000 $357,500 $390,000
$312,000 $536,250 $16,419,476
Total Cost Avoidance +
Savings
+ + +
+ +Avoidance of
data breaches involving cloud$3,723,726
=
2016 © Netskope. All rights reserved. 19
Finally, Plan and Share Your Roadmap and Value Timeline
Mobile Device
Management
SandboxedMail and WebCloud
Spend Control
Data Loss Prevention
Real-time Policy
Enforcement
Govern all cloud apps, including
ecosystems
Allow, Don’t Block
Netskope Value-on-Investment
Any app, any device, anywhere
Malware Protectio
n
Discover all cloud apps and assess risk
Vendor Assurance
Risk Assessment
Netskope Advanced Discovery
Safely enable sanctioned cloud
appsGovern all apps and
data
Netskope for:Box, Dropbox, Egnyte, Google Suite/GCP, Office 365, Salesforce, ServiceNow, Slack
Netskope Active Platform
Granular Access Control
DLP, anti-malware, real-
time policy enforcement, and access
control across all apps
2016 © Netskope. All rights reserved. 20
This Is All Well and Good, But We Need Tools!(We Put Examples Into a Handy Packet for You: netskope.com/casb-starter-kit)
Cloud Risk Assessment
Benchmarks ROI Calculator
2016 © Netskope. All rights reserved.
Thank you!
21
Jamie Barnett, [email protected]@jamiecbarnett/jamiecbarnett