Netskope #1: A Blueprint for Designing a New Security Perimeter

Logo
Presented by

Bob Gilbert, Chief Evangelist, Netskope; Brandon Dunlap, Moderator

About this talk

Recent research shows that more than 85% of web traffic is comprised of cloud services. The rapid adoption of cloud and mobile is fundamentally changing network traffic patterns and the movement of data, rendering existing network and security models obsolete. This shift is resulting in enterprise security teams supplementing next-gen firewalls (NGFWs), secure web gateways (SWGs), and VPNs with cloud access security brokers (CASBs). While CASBs address a key set of cloud-specific use cases tied to visibility, data security, compliance, and threat protection, your dissolving corporate perimeter is also forcing security teams to rethink their entire legacy security stack. After all, if most of your web traffic is comprised of cloud services, why does most of your security spend on security tools that are not effective in this new world? Join Netskope for Part 1 of this 3-part series to discover new blind spots that exist with legacy security tools, why simply moving legacy security tools to the cloud is not enough, top cloud security use cases driving the need for a new perimeter and the essential requirements for a new, more effective perimeter.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (445)
Subscribers (138888)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.