Latest Content

Find cloud security resources in this hub to get a deeper understanding of the cloud access security broker (CASB) space and how Netskope can help you understand activities, protect data, stop threats and respond to incidents

  • Netskope Cloud Report - August 2019

    Netskope Cloud Report - August 2019

    Cloud Services account for 85% of all enterprise web traffic.

    View Now
  • Delivering Real-time Cloud Security Without Trading Off Performance

    Delivering Real-time Cloud Security Without Trading Off Performance

    View Now
  • 6 Common Cloud Security Use Cases

    View Guide
  • Netskope NewEdge3:23

    Netskope NewEdge

    Watch Video
  • What’s the future of CASB and SWG42:56

    What’s the future of CASB and SWG

    Watch Video
  • Web Security with Cloud Performance and Scale41:59

    Web Security with Cloud Performance and Scale

    Watch Video
  • Top 6 Questions To Ask Your Cloud DLP Vendor - Microsoft 365 Edition

    Top 6 Questions To Ask Your Cloud DLP Vendor - Microsoft 365 Edition

    View Now
  • Optimized Security for Multi-Cloud IaaS Environments

    Optimized Security for Multi-Cloud IaaS Environments

    Learn how to deploy the Netskope platform to secure your growing off-premises workloads.

    View Now
  • Gartner Magic Quadrant for Cloud Access Security Broker

    Get Your Copy
  • 6 Critical Steps to Securing Office 36555:35

    6 Critical Steps to Securing Office 365

    Watch Video
  • Optimizing Security Operations in a Cloud-First World47:53

    Optimizing Security Operations in a Cloud-First World

    Watch Video
  • Cloud Security Interactive Evaluator Guide

    Cloud Security Interactive Evaluator Guide

    View Now
  • How to Protect Your Data in a Multi Cloud Environment56:31

    How to Protect Your Data in a Multi Cloud Environment

    Watch Video
  • 2019 CyberSecurity Insiders Cloud Security Report

    2019 CyberSecurity Insiders Cloud Security Report

    View Now
  • Securing GCP: Top Ten Mistakes to Avoid

    Securing GCP: Top Ten Mistakes to Avoid

    View Now
  • 2018 Gartner Magic Quadrant for CASB

    2018 Gartner Magic Quadrant for CASB

    View Now
  • Advantages of Unifying Cloud and Web Security

    Advantages of Unifying Cloud and Web Security

    View Now
  • Netskope Cloud Report - October 2018 - A Look at AWS

    Netskope Cloud Report - October 2018 - A Look at AWS

    View Now
  • 20 Examples of Smart Cloud Security

    20 Examples of Smart Cloud Security

    View Now
  • The Definitive CASB Business Case Kit - Presentation

    The Definitive CASB Business Case Kit - Presentation

    View Now
  • 10 Questions to Ask Your Cloud Access Security Broker

    10 Questions to Ask Your Cloud Access Security Broker

    View Now
  • How the Security Inversion Impacts User and Data Protection

    How the Security Inversion Impacts User and Data Protection

    View Now
  • ESG White Paper - Elastic Cloud Gateways: The Evolution of Secure Cloud Access

    ESG White Paper - Elastic Cloud Gateways: The Evolution of Secure Cloud Access

    View Now
  • Is Web Filtering Turning into Inline App API-JSON Filtering?

    Is Web Filtering Turning into Inline App API-JSON Filtering?

    The answer depends on where you desire to control apps and to what depth of policy controls are required.  Next generation firewalls (NGFW) long ago recognized apps in allow or deny policy...

    View Now
  • Shift Your Web Security To The Cloud, For The Cloud

    Shift Your Web Security To The Cloud, For The Cloud

    View Now
  • How Do Web Security Vendors Claim, “Any App” Support?

    How Do Web Security Vendors Claim, “Any App” Support?

    For administrators of web security solutions, they know that claims of ‘any and all’ coverage is fraught with suspicion knowing there are always exceptions and the “devil is in the details”.  In...

    View Now
  • Gartner Note: The Future of Network Security Is in the Cloud

    Gartner Note: The Future of Network Security Is in the Cloud

    Digital business transformation inverts network and security service design patterns, shifting the focal point to the identity of the user and/or device — not the data center...

    View Now
  • Shift Your Web Security to the Cloud, for the Cloud

    Shift Your Web Security to the Cloud, for the Cloud

    Get a detailed look at what’s behind web security trends and tactics in the cloud era--and how they impact your employees and your enterprise.

    View Now
  • IaaS Security: Not Just Checking a Box

    IaaS Security: Not Just Checking a Box

    Digital Transformation is taking over, we all know this and enterprises are adopting this at a higher than consumable rate. What once took many times months to provision in our legacy...

    View Now
  • Cloud Trailblazer - Eric Gauthier, Scout Exchange3:33

    Cloud Trailblazer - Eric Gauthier, Scout Exchange

    Watch Video
  • Demo - Netskope for ServiceNow2:21

    Demo - Netskope for ServiceNow

    <p>Netskope protects sensitive data and helps ensure compliance for your ServiceNow environment.</p>

    Watch Video
  • App Controls for your Secure Web Gateway – API or Proxy?

    App Controls for your Secure Web Gateway – API or Proxy?

    For most organizations, over 95% of apps fall into the shadow IT area where business units adopt them without IT knowledge or administration rights.  Considering the average organization utilizes...

    View Now
  • Evalueserve Case Study

    Evalueserve Case Study

    View Now
  • DEF CON 27 - Exploiting AWS Loopholes

    DEF CON 27 - Exploiting AWS Loopholes

    DEF CON 27 talk

    View Now
  • DEF CON 27 - The Future of Command and Control

    DEF CON 27 - The Future of Command and Control

    DEF CON 27 talk

    View Now
  • DEF CON 27 - Phishing in the Cloud Era

    DEF CON 27 - Phishing in the Cloud Era

    DEF CON 27 talk

    View Now
  • Defcon 27 - Exploiting IAM in GCP

    Defcon 27 - Exploiting IAM in GCP

    Defcon 27 talk

    View Now
  • Defcon Cloud Village – Phishing in the Cloud Era

    Defcon Cloud Village – Phishing in the Cloud Era

    The DEFCON27 computer security conference is one of the world’s largest and reputed hacker conventions that will be held from August 8th to August 11th in Las Vegas, Nevada. This event consists of...

    View Now
  • Why the Future of Command and Control is the Cloud

    Why the Future of Command and Control is the Cloud

    Cloud adoption has grown dramatically within the enterprise and shows no signs of stopping. Many cloud services such as Github, Slack, Dropbox, and others are part of everyday business and...

    View Now
  • AWS Loopholes with Temporary Credentials

    AWS Loopholes with Temporary Credentials

    If you don’t already have a plan for managing temporary credentials, or tokens in your AWS environment, you need one ASAP. Temporary tokens can be a security nightmare because: They provide nearly...

    View Now
  • Permission Isolation in GCP

    Permission Isolation in GCP

    When Identity and Access Management (IAM) permissions are not sufficiently isolated using the structure provided by the Google Cloud Platform (GCP), the results could be disastrous. Ideally, if...

    View Now
  • loading
    Loading More...