Netskope

2012
Los Altos, CA, USA
Jul 10, 2020   |  By Ashwin Vamshi
Previously Netskope Threat Labs published a blog post about a Lnkr ad injector campaign launched using Google Chrome extensions. As Figure 1 illustrates, the number of Lnkr infections spiked dramatically in November 2019 and again in the spring of 2020, when Brian Krebs uncovered information about the source of the infected Chrome extensions. .
Jun 30, 2020   |  By Colin Estep
Any enterprise running virtual machines in the cloud needs to securely manage them, which is commonly done with Remote Desktop Protocol (RDP) or Secure Shell (SSH). One problem that arises is how to manage this access without exposing the management protocols to the internet, leaving them open to various types of attacks. Historically, it has been a best practice to implement bastion hosts to limit the exposure of the management protocols. However, there are some disadvantages to that approach.
Jun 25, 2020   |  By Sanjay Beri
Last week I had the opportunity to talk to John Thompson as part of The Reimagine Series. The Reimagine Series sees the leadership team at Netskope host discussions with technology trailblazers as they introduce thought-provoking ideas that transform the way enterprises work. Across the series, we have been exploring innovative approaches to solving today’s technology and security challenges and I was really excited to catch up with John to hear his ideas.
Jun 18, 2020   |  By Joe DePalo
You’ve probably heard at one point or another the cliché that the internet is broken. It’s no secret that the underlying infrastructure that businesses around the world use to access cloud applications and data is flawed and wasn’t built with today’s scale in mind. That puts IT security leaders in a tough position because there’s a penalty for deploying security tools, in the form of increased latency.
May 28, 2020   |  By Beau Hutto
The world of cloud security is known for moving fast, turning on a dime, and evolving with ever-growing threat vectors. The Federal sector, on the other hand, has highly regulated, rigorous standards when it comes to their security, and for very good reason. The data they’re protecting is about as sensitive as it gets, and any exposure is literally a matter of national security.
Feb 21, 2019   |  By Netskope
Google Cloud Platform (GCP) provides a great way to save money and move faster. But administrators aren't often aware of the best security practices and controls to implement. How do you move to GCP efficiently without increasing the risk of a security breach? Read this new whitepaper to help your organization avoid common mistakes.
Oct 9, 2018   |  By Netskope
As you evaluate cloud access security brokers (CASBs) to safely enable sanctioned and unsanctioned (shadow IT) cloud services, cloud DLP is an important component of the solution. This 6-question checklist will give you specific, use case-based examples to help you differentiate between CASBs and choose the right one for your organization.
Oct 6, 2018   |  By Netskope
To achieve business goals, business leaders are choosing to work with multiple cloud providers, embracing dierent clouds optimized for various services. By distributing workloads and mitigating risk, a multi-cloud approach is increasingly recognized as a good strategy for organizations that want to maximize the beneits of the cloud and also easily adapt to changing business needs. In this eBook, we focus on ive common questions about multi-cloud.
Aug 29, 2018   |  By Netskope
While AWS manages security of the cloud, security in the cloud is the responsibility of the customer. Security teams need to understand their part in the shared responsibility model, where customers retain control of what security they choose to implement to protect their own content, platform, applications, systems, and networks, no differently than they would for applications in an onsite data center.
Aug 1, 2018   |  By Netskope
In this white paper, we'll share the behavior of malware infections by exploring the relationships between cloud application users and their files residing in the cloud. Netskope has observed such user-file relationships in cloud applications such as Google Drive, Dropbox, AWS, etc. in customer environments.
Jun 1, 2020   |  By Netskope
Remote Learning & Security with Dell and Netskope. Learn how Netskope and Dell enable collaboration while protecting students, faculty, and data
Apr 27, 2020   |  By Netskope
In this demo video see how Netskope, Okta, and Exabeam work together for real time security in this use case of a (bad) remote worker.
Sep 25, 2019   |  By Netskope
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Reimagine your perimeter with Netskope.
Sep 25, 2019   |  By Netskope
Netskope's vision is to redefine cloud, network, and data security to reimagine your perimeter in a data-centric, cloud smart, and fast way to make your security teams significantly more efficient and effective.
Feb 20, 2019   |  By Netskope
Netskope's Head of IaaS Product Management, Neil King, discusses how Netskope secures your sensitive data in Public Cloud Infrastructure like GCP, Azure, and AWS.