Every Solution You Can Imagine – and More
What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need
Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv
Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner.
However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Cloud Application Instance Awareness Using Netskope
Around 2012, firewall providers added application identification and control into their technologies, and while this capability was initially well received, risk appetite and working conditions have changed. Since then, organizations have looked to become more agile, reduce outages and remove themselves from the constant cycle of upgrading on-premises applications by adopting SaaS services like Microsoft 365. While the prevalence of SaaS services was increasing, the initial approach firewalls took at identifying, classifying and enforcing policies against cloud applications struggled to keep pace.
Using the legacy application identification and enforcement model to identify and classify applications, many organizations had to take the binary approach of deciding to allow or deny the use of an application. In today’s hybrid and distributed environments this approach doesn’t allow organizations to limit user activity depending on the instance of the application, regardless of whether the application is sanctioned or unsanctioned.
For many firewall and secure web gateway product manufacturers, the answer to this question is yes. For Netskope the short answer is no, and the longer answer is the SaaS app and type of application is just the starting point. For many applications, Netskope can not only identify the application, but it can also identify the instance of a SaaS app, allowing for more granular policy controls instead of the traditional binary approach.
While some applications offer instance details in the URL, others do not, even if they’re part of the same suite. Take, for instance, Outlook Online and SharePoint Online. With SharePoint Online the instance can be identified in the URL, but this isn’t the case for Outlook Online. Organizations determining instances of SaaS applications shouldn’t rely on URLs, as tech companies can decide to move to a more general address (without soliciting input), potentially leaving the enterprise reacting to a service being blocked.
Instance identification is one of many areas where Netskope differentiates itself from the competition. When Netskope is inline for all web and cloud traffic, it can identify instance details for popular applications like Google Workspace, Microsoft 365 and Box, regardless of whether the applications are personal or business versions. Netskope can identify instance details from the user’s session by inspecting API calls and JSON responses.
The above screenshot shows the application details for Outlook online that Netskope captures. As you can see, my access to outlook.office.com was identified as a greystreetlabs instance and is what is set within the M365 tenant. Also, Netskope performs classification of the category and application, which allows organizations the traditional approach of allowing/denying the use of a site/application based on the category or application.
In this screenshot, you’ll also notice Netskope offers the ability to create your own instance name for use within the Netskope console. While Netskope identified my OneDrive for Business instance as greystreetlabs, I created a custom instance name that can be used within Netskope’s real time policies for granular control to reduce DLP false positives.
To demonstrate Netskope’s granular control based on applications instances, we’ll walk through an example of how the controls translate into policies. The scenario is as follows:
For simplicity, in this example all organizations use M365/One Drive for business; however, Netskope can identify instances for a variety of applications and limit access and functionality in a similar fashion.
In policy #1, any Grey Street Labs user is permitted to upload into and download from their sanctioned instance of OneDrive for Business if the files don’t contain malware.
In policy #2, I’m restricting uploads to Acme Find’s OneDrive for Business to Dave and ensuring the data he’s uploading to their instance has no PCI data.
In policy #3, Dave is allowed to download from any instance of OneDrive for Business if it doesn’t contain malware; however, he will be unable to upload data to OneDrive for Business instances other than Grey Street Labs or Acme Find.
The combination of these policies allows Grey Street Labs to provide their users access to sanctioned cloud applications without disrupting partner business processes, reducing DLP false positives when it makes sense and ensuring malware isn’t being introduced into the environment.
Netskope’s instance awareness functionality in their Cloud Inline and Next Gen Secure Web Gateway fills the void between basic allow or deny policies, permitting granular controls across SaaS apps. The level of specificity within policy definitions is impossible to implement without the capability to build controls based on the instance level classification for the application.
Optiv Security: Secure greatness.®
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.
Optiv delivers Netskope’s unified solution to secure both approved and unmanaged cloud services, public cloud, websites and private applications in private data centers or in the cloud.
Cloud Security Services
Defend your cloud ecosystems with Optiv. Our Cloud Security Services can help design cloud security solutions that tie directly to your business'...
Cybersecurity Field Guide #3.0: Get SASE to Accelerate Your Digital Transformation
SASE isn’t a new technology – it’s a vision for converging existing networking and security capabilities in a cloud-delivered service. Of course,...
Let us know what you need, and we will have an Optiv professional contact you shortly.