Hi [[ session.user.profile.firstName ]]

Netskope

  • Date
  • Rating
  • Views
  • How Berkshire Bank Safely Enables the Cloud with a CASB
    How Berkshire Bank Safely Enables the Cloud with a CASB Ryan Melle, VP Information Security Officer at Berkshire Bank Recorded: Nov 1 2017 25 mins
    Berkshire is growing. Learn how Netskope helps enable their growth with safe cloud enablement.

    Ryan Melle, Berkshire Bank VP Information Security Officer, shares three use cases where Netskope helps Berkshire Bank enable the cloud: Cloud DLP, Granular Access Control Policies, and Netskope for Salesforce and Office 365.
  • Evolving Your Cloud Security Stack With a CASB
    Evolving Your Cloud Security Stack With a CASB Gartner's Cloud Security Research Director Steve Riley and Netskope CEO Sanjay Beri Recorded: Jul 28 2017 30 mins
    Hear from Gartner’s cloud security research director Steve Riley.

    New API-driven cloud and web services, along with mobile devices, have unlocked new and unsurpassed levels of productivity.

    The reality, however, is that while the way people work has evolved, legacy security tools were designed for a different time — and new tools such as cloud access security brokers (CASBs) are quickly gaining the attention of security architects and CISOs worldwide.

    Netskope is proud to sponsor this webcast where attendees will hear from Gartner’s cloud security research director Steve Riley.

    Attendees will learn:

    - how organizations are rethinking visibility, governance, data security, and threat protection

    - how to build a new security stack as resilient and nimble as the new workforce they protect.

    Featured presenters

    Steve Riley
    Cloud Security Research Director
    Gartner

    Sanjay Beri
    Chief Executive Officer
    Netskope
  • CASB Redefined: the Emergence of Cloud Security Platforms
    CASB Redefined: the Emergence of Cloud Security Platforms Join Doug Cahill, Senior Analyst, ESG and Bob Gilbert, Chief Evangelist, Netskope Recorded: Apr 18 2017 62 mins
    The development of the cloud access security broker (CASB) category has mirrored the adoption of cloud services - rapid. But this accelerated market development has also led to misconceptions about both what a CASB is and what a CASB should be moving forward. As CASBs evolve and expand their scope to cover more dimensions of cloud security, the notion of a 'cloud security platform' has emerged.

    Join Doug Cahill, Senior Analyst, ESG and Bob Gilbert, Chief Evangelist, Netskope for this webinar where attendees will learn the following:

    - How CASBs enable enteprises to fully harness cloud services safely and efficiently;
    - The visibility and control requirements of cloud security platforms;
    - Desired outcomes of what a CASB should accomplish and use cases that support those outcomes
    - The latest trends around the shift to cloud security platforms
  • “Cloud-First” Ransomware: A Technical Analysis
    “Cloud-First” Ransomware: A Technical Analysis Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari Recorded: Apr 3 2017 44 mins
    Get a technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and learn how to defend against them.

    Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why? Because many organizations don't inspect their cloud SSL traffic for a malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.

    Join Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time.

    Krishna and Ravi will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs.

    These include:

    - Virlock, which encrypts files and also infects them, making it a polymorphic file infector
    - CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
    - CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
    - The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL
  • 5 Highest-Impact CASB Use Cases
    5 Highest-Impact CASB Use Cases Bob Gilbert, Chief Evangelist at Netskope​ Recorded: Jan 19 2017 61 mins
    Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in ServiceNow, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers (CASB) can make an impact in their organizations.

    Join Bob Gilbert, chief evangelist of Netskope, for a session on the top five CASB use cases that have the highest impact on cloud-consuming enterprises.

    Attendees will learn:

    •Industry-specific data that’s foundational to any cloud security business case;

    •The five highest-impact CASB use cases from our customers, demonstrated from the perspective of users and security professionals; and

    •How those use cases translate to “must have” requirements for any CASB evaluation.
  • The State of Cloud-Based Malware and Data Breaches
    The State of Cloud-Based Malware and Data Breaches Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute. Gautam Kanapathi, Product Manager at Netskope Recorded: Nov 15 2016 51 mins
    Netskope, the leading Cloud Access Security Broker, has partnered with the Ponemon Institute, the foremost expert on data breach research, to understand the state of cloud threats, including cloud malware and cloud-related data breaches. The webinar will include an in-depth look at trends and survey data, including:

    - Malware in cloud services – how much is there, how it got there, and how cloud propagates it
    - Data breaches and cloud – does cloud make data breaches more likely, and why?
    - Data breach costs and outcomes, and how those change when cloud is involved
  • Malware Attack "Fan-out" Effect in the Cloud
    Malware Attack "Fan-out" Effect in the Cloud Krishna Narayanaswamy, Founder and Chief Scientist, Netskope Recorded: Jun 21 2016 60 mins
    The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

    Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

    - The multiplier effect that that the cloud can have on the probability of a data breach
    - Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
    - How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
    - A forensic walk-through in the reconstruction of a complex audit following a data breach
    - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud
  • Cloud Security for Dummies, Enterprise Mobility Edition
    Cloud Security for Dummies, Enterprise Mobility Edition Christopher Campbell, Dir. Enterprise Mobility, VMware & authors of Cloud Security for Dummies, Lebin Cheng & Steve Malmskog Recorded: Apr 26 2016 56 mins
    VMware AirWatch and Netskope present:

    Cloud Security for Dummies, Enterprise Mobility Edition

    As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.

    Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:

    Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;

    Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;

    Proactively protect sensitive user and corporate information through policy; and

    Halt threats in the cloud before they propagate to users’ devices.
  • Safely Enabling the Cloud in a World of Malware and Data Breaches
    Safely Enabling the Cloud in a World of Malware and Data Breaches Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope Recorded: Apr 12 2016 61 mins
    Cloud adoption is quickly becoming a must-have for enterprises, as organizations clamor to exploit the cost savings and increase in collaboration and productivity that are now established benefits of many cloud apps But at the same time, this rise in adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

    Attend this webinar with Adrian Sanabria, Senior Analyst, Enterprise Security, 451 Research and Abhay Kulkarni, VP Engineering, Netskope for a spirited discussion that will explore the following:

    - Trends in the market related to cloud adoption and the steps being taken to address security concerns;
    - How to securely enable the use of cloud services for enterprise employees;
    - A “how to” for identifying data breaches in an enterprise cloud environment using advanced anomaly detection techniques;
    - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud.
  • The Anatomy of a Cloud Data Breach
    The Anatomy of a Cloud Data Breach Krishna Narayanaswamy, Chief Scientist, Netskope Recorded: Mar 22 2016 27 mins
    As cloud services proliferate in organizations, the nature of data breaches changes to fit the nature of those services. Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise. Drawing on unique anonymized data seen in the Netskope cloud, Krishna will demonstrate how to detect a breach in the cloud using anomaly detection techniques, and how to use advanced forensic techniques to reconstruct a complex audit trail of events leading up to and following the breach.

Embed in website or blog