Bob Gilbert

Bob heads up the product marketing efforts at Netskope, the leader in safe cloud enablement. Bob is a prolific speaker and product demonstrator, reaching live audiences in more than 45 countries over the past decade. His career spans more than 20 years in Silicon Valley where he has held product management and marketing leadership roles at various technology companies. Most recently he was the Chief Evangelist at Riverbed.

  • Cloud Security Use Case #3: Ensure Social Media Compliance

    Cloud Security Use Case #3: Ensure Social Media Compliance

    I recently blogged about the two of the most common cloud security use cases that customers are covering with Netskope. I would like to continue the discussion and talk about use case #3, which is...

    View Now
  • Cloud Security Use Case #2: Granular Control of Unmanaged Cloud Apps

    Cloud Security Use Case #2: Granular Control of Unmanaged Cloud Apps

    I recently blogged about the first of the six most common cloud security use cases that customers are covering with Netskope. I would like to continue the discussion and talk about use case #2,...

    View Now
  • Cloud Security Use Case #1: Control Data Exposure

    Cloud Security Use Case #1: Control Data Exposure

    This is my fifth year at Netskope and it is awesome to see first-hand the rapid adoption of our ONECloud platform by some of the largest enterprises in the world. It is also interesting to see the...

    View Now
  • Protecting against employees that ‘never shut up’ in Slack

    Protecting against employees that ‘never shut up’ in Slack

    An Interesting article was published this week on CNBC about how the use of Slack worries some CEOs who say that employees ‘never shut up’ on the app. This is another example of a cloud app that...

    View Now
  • How Netskope stops sensitive data being exposed publicly in Box

    How Netskope stops sensitive data being exposed publicly in Box

    Another example of public shares of personal data surfaced this week when security firm Adversis discovered hundreds of Box customers had hundreds of thousands of documents and terabytes of data...

    View Now
  • Introducing Continuous Security Assessment for Google Cloud Platform

    Introducing Continuous Security Assessment for Google Cloud Platform

    If you are like many enterprises, moving workloads to public cloud environments like Google Cloud Platform presents risks tied to data loss. Recent data breaches have proven that the primary...

    View Now
  • Netskope Security Cloud – New feature spotlight for September

    Netskope Security Cloud – New feature spotlight for September

    Prior to Netskope, I worked for a company that was focused on launching innovative new features to the market one to two times per year. The process typically resulted in the delivery of one major...

    View Now
  • A six-step approach to Zero Trust in today’s perimeterless world

    A six-step approach to Zero Trust in today’s perimeterless world

    Zero Trust is a security concept that is centered around the belief that organizations should not trust anything inside or outside its perimeter and instead must verify anything trying to access...

    View Now
  • Fishing for data loss and unexpectedly catching malware

    Fishing for data loss and unexpectedly catching malware

    We are starting to see a trend develop with Netskope customers who initially focus on a set of cloud security use cases, then end up expanding their use case coverage based on what was uncovered...

    View Now
  • There’s a place that is scarier than the Dark Web

    There’s a place that is scarier than the Dark Web

    I originally planned to focus this blog post on the dark web. Many of you reading this blog may know that the dark web is a well-known part of the internet where many sites are not indexed by...

    View Now
  • There’s a place that is scarier than the Dark Web

    There’s a place that is scarier than the Dark Web

    I originally planned to focus this blog post on the dark web. Many of you reading this blog may know that the dark web is a well-known part of the internet where many sites are not indexed by...

    View Now
  • Throwback Thursday post: 5 Ways Steve Kerr would coach users on how to safely use the cloud

    Throwback Thursday post: 5 Ways Steve Kerr would coach users on how to safely use the cloud

    Note: When we posted this blog more than two years ago, coaching workflows were an important part of many of our customers’ cloud security strategy. This capability continues to be key today with...

    View Now
  • Real-time Control and Data Protection via Out-of-Band API

    Real-time Control and Data Protection via Out-of-Band API

    Netskope leads the CASB market with a versatile deployment architecture that includes several out-of-band and inline proxy deployment modes. From day one, customer use cases have been the...

    View Now
  • Triaging Cloud Security in Four Steps

    Triaging Cloud Security in Four Steps

    With an average of more than 1,000 cloud services in use by enterprises, how do you triage your cloud security and streamline the process of applying compensating controls across so many cloud...

    View Now
  • RSA Conference 2017 Survey: Cloud Services, the New Administration and GDPR

    RSA Conference 2017 Survey: Cloud Services, the New Administration and GDPR

    A record number of more than 43,000 IT and security professionals attended RSA Conference two weeks ago in San Francisco. Whether discussing cyber policy, strategies for cloud management, or...

    View Now
  • Netskope at RSA Conference 2017: Wednesday

    Netskope at RSA Conference 2017: Wednesday

    It’s huuuuuuump day, even if you’re not a camel! What’s going on in the Netskope booth today at S839 in Moscone South? Here’s the rundown: 10am. Netskope demo. Six highest-impact use cases...

    View Now
  • The Most Critical CASB Use Cases in the Market Today: Enforce Layered Policies That Include a “Base” and “Exception” Policy

    The Most Critical CASB Use Cases in the Market Today: Enforce Layered Policies That Include a “Base” and “Exception” Policy

    As enterprise IT gets smarter and more nuanced about cloud security, it now expects to exert controls over cloud services according to a multitude of contextual factors. IT and security...

    View Now
  • 10 essential DLP features you should demand from your CASB

    10 essential DLP features you should demand from your CASB

    According to Gartner, cloud access security brokers (CASBs) deliver capabilities around four pillars of functionality; visibility, compliance, data security, and threat protection. Within the data...

    View Now
  • 2017 TAG Cyber Security Annual

    2017 TAG Cyber Security Annual

    View Now
  • Why a CASB is Critical for Securing Office 36538:36

    Why a CASB is Critical for Securing Office 365

    Watch Video
  • loading
    Loading More...