A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Breadcrumb Home Insights Source Zero Cloud Application Instance Awareness Using Netskope March 23, 2022 Cloud Application Instance Awareness Using Netskope Background Around 2012, firewall providers added application identification and control into their technologies, and while this capability was initially well received, risk appetite and working conditions have changed. Since then, organizations have looked to become more agile, reduce outages and remove themselves from the constant cycle of upgrading on-premises applications by adopting SaaS services like Microsoft 365. While the prevalence of SaaS services was increasing, the initial approach firewalls took at identifying, classifying and enforcing policies against cloud applications struggled to keep pace. Using the legacy application identification and enforcement model to identify and classify applications, many organizations had to take the binary approach of deciding to allow or deny the use of an application. In today’s hybrid and distributed environments this approach doesn’t allow organizations to limit user activity depending on the instance of the application, regardless of whether the application is sanctioned or unsanctioned. Wait, Isn’t a SaaS App, Just a SaaS App? For many firewall and secure web gateway product manufacturers, the answer to this question is yes. For Netskope the short answer is no, and the longer answer is the SaaS app and type of application is just the starting point. For many applications, Netskope can not only identify the application, but it can also identify the instance of a SaaS app, allowing for more granular policy controls instead of the traditional binary approach. While some applications offer instance details in the URL, others do not, even if they’re part of the same suite. Take, for instance, Outlook Online and SharePoint Online. With SharePoint Online the instance can be identified in the URL, but this isn’t the case for Outlook Online. Organizations determining instances of SaaS applications shouldn’t rely on URLs, as tech companies can decide to move to a more general address (without soliciting input), potentially leaving the enterprise reacting to a service being blocked. Image Image Instance identification is one of many areas where Netskope differentiates itself from the competition. When Netskope is inline for all web and cloud traffic, it can identify instance details for popular applications like Google Workspace, Microsoft 365 and Box, regardless of whether the applications are personal or business versions. Netskope can identify instance details from the user’s session by inspecting API calls and JSON responses. Diving Into the Details The above screenshot shows the application details for Outlook online that Netskope captures. As you can see, my access to outlook.office.com was identified as a greystreetlabs instance and is what is set within the M365 tenant. Also, Netskope performs classification of the category and application, which allows organizations the traditional approach of allowing/denying the use of a site/application based on the category or application. Image In this screenshot, you’ll also notice Netskope offers the ability to create your own instance name for use within the Netskope console. While Netskope identified my OneDrive for Business instance as greystreetlabs, I created a custom instance name that can be used within Netskope’s real time policies for granular control to reduce DLP false positives. To demonstrate Netskope’s granular control based on applications instances, we’ll walk through an example of how the controls translate into policies. The scenario is as follows: Dave is an employee of Grey Street Labs and needs to share data with a partner called Acme Find. Acme Find has shared a OneDrive for Business folder with Dave for collaboration. Dave will also need the ability to download from Acme Find’s shared folder. Grey Street Labs has other business partners that need to share data with Dave, but there’s no need for him to share his own data with these partners. For simplicity, in this example all organizations use M365/One Drive for business; however, Netskope can identify instances for a variety of applications and limit access and functionality in a similar fashion. Let’s Look at an Example In policy #1, any Grey Street Labs user is permitted to upload into and download from their sanctioned instance of OneDrive for Business if the files don’t contain malware. In policy #2, I’m restricting uploads to Acme Find’s OneDrive for Business to Dave and ensuring the data he’s uploading to their instance has no PCI data. In policy #3, Dave is allowed to download from any instance of OneDrive for Business if it doesn’t contain malware; however, he will be unable to upload data to OneDrive for Business instances other than Grey Street Labs or Acme Find. The combination of these policies allows Grey Street Labs to provide their users access to sanctioned cloud applications without disrupting partner business processes, reducing DLP false positives when it makes sense and ensuring malware isn’t being introduced into the environment. Conclusion Netskope’s instance awareness functionality in their Cloud Inline and Next Gen Secure Web Gateway fills the void between basic allow or deny policies, permitting granular controls across SaaS apps. The level of specificity within policy definitions is impossible to implement without the capability to build controls based on the instance level classification for the application. By: Matt Frank Partner Architect for Netskope | Optiv Matt is Optiv’s Partner Architect for Netskope, specializing on how Optiv helps customers move to a Secure Access Service Edge (SASE) / Security Service Edge (SSE) architecture utilizing Netskope’s platform. Share: Source Zero® SASE Blue Team I&I CASB Netskope Risk Mitigation DLP Data Protection Partner Series Partner Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com. Related Insights Image Netskope Optiv delivers Netskope’s unified solution to secure both approved and unmanaged cloud services, public cloud, websites and private applications in private data centers or in the cloud. Image Cloud Security Services Defend your cloud ecosystems with Optiv. Our Cloud Security Services can help design cloud security solutions that tie directly to your business'... Image Accelerate Your Digital Transformation Journey with SASE SASE isn’t a new technology – it’s a vision for converging existing networking and security capabilities in a cloud-delivered service.
Optiv Security: Secure greatness.® Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?