ExtraHop & Netskope Zero Trust Integration

Thank you to all those that joined us in person for this event! For those that missed it or want to watch it again, please see the recording below as well as the slide downloads you can follow along with! 

Watch event recording

Zero Trust is fast becoming a cybersecurity imperative

Zero trust is a concept of applying the least amount of trust possible to allow an entity the ability to access the resource it requires to complete the assigned or needed task. This architecture works on the principle there is no implicit trust or baseline access to a resource, removing the concept of trusted by location as seen with the classic perimeter defense system. Unfortunately, many organizations are still relying on systems built with implicit trust in mind. Once something is inside the network perimeter, it can move laterally, unchecked. The solution is Zero Trust. More and more organizations are moving forward with a zero trust architecture, in order to improve cyber resiliency and better protect their networks from cyberattacks, expand remote work, modernize technology infrastructure, accelerate cloud adoption, and provide secure access to external partners.
 
Many organisations have made progress in implementing zero trust architectures and deploying technologies like security service edge (SSE) so they can leverage cloud environments and implement work-from-anywhere in a secure manner. Gartner predicts “by 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services, and private application access using a SASE/SSE architecture by 2025, up from 20% in 2021.”
 

However the secure tunnels created by SSE means that network visibility tools like NDR and NAV can’t inspect this traffic, which leaves security and IT teams with a blind spot. The new integration between Netskope and ExtraHop is designed to address this problem. The Netskope Cloud TAP in combination with the ExtraHop Zero Trust Extension for Netskope, provides enterprises with unprecedented visibility into behavior and communication among devices and services in remote and distributed networks, across on-premises, hybrid, and cloud deployments, at any scale. Join us for this in-person event as we deep dive into the Zero Trust Integration between ExtraHop and Netskope.

AGENDA

1:00pm Welcome note
Alex Teh, Chillisoft CEO

1:15pm ExtraHop Presentation 
Simon Howe, ExtraHop Area Vice President 

2:00pm Netskope Presentation 
Dane Blackmore – Netskope CountryManager

2:45pm: Q&A

3:30pm: Refreshments & Networking

SPEAKERS

Simon-Howe-Regional-Director-Attack-IQ
Simon Howe - Area Vice President - ExtraHop

Simon is the Area Vice President for ExtraHop. A respected industry expert in the APJ region with over 25 years of sales and management experience Simon collaborates with the cyber security community to inform and uplift cyber security programs and capability.  Previous to this role, Simon was responsible for building and managing relationships with organisations in Asia Pacific & Japan (APJ) for AttackIQ.  Simon has also held senior sales and leadership roles at LogRhythm where he served as Vice President of Sales for Asia Pacific, Symantec, Commvault and Acronis. Originally from the UK, Simon has lived in Sydney since 1998.

Dane Blackmore
Dane Blackmore - Country Manager, Netskope

Dane Blackmore is the country manager for Netskope, and has over a decade of experience working on digital transformation and cyber security objectives with business and government orgs of all sizes.

He is passionate about helping organisations to use zero trust architecture and cybersecurity to safely exploit one of their most valuable assets – customer data.

How does it work?

Netskope Intelligent SSE—twice recognized as a GartnerⓇ Magic Quadrant Leader for SSE—with ExtraHop Reveal(x)—named a Leader in The Forrester WaveTM Network Analysis and Visibility, Q2 2023, work in unison. Netskope Intelligent SSE streams encrypted traffic packets and session keys to an ExtraHop Zero Trust Extension sensor and analyzes the data for security and performance anomalies. Reveal(x) natively decrypts the original network packets, leveraging over 70 different protocols, to provide complete visibility into virtually any traffic source. Automatic discovery and classification of devices communicating on the network enables security teams to fully map the attack surface, thereby eliminating blind spots. Continuous, automated 90-day lookback helps identify signatures of new CVEs and zero-day attacks, while signature- and behavior-based machine learning models enable multi-layer detection of malicious activity with high confidence.

Enterprises using the ExtraHop Zero Trust Extension for Netskope can:

  • Close gaps in zero trust architectures and reduce risks by gaining visibility into previously inaccessible network segments.
  • Accelerate threat detections through remote endpoints and SaaS traffic.
  • Resolve performance issues faster and more reliably for business-critical apps on cloud infrastructure.
  • Strengthen compliance posture by gaining network telemetry for forensics and logging.

The improved visibility provided by the integration allows organizations to close gaps in their zero trust security posture and gives them broader MITRE ATT&CK detection coverage, both of which help to reduce the risk of a breach and compliance fines. The integration also allows security and IT teams to leverage their existing SSE and NDR investments to achieve greater zero trust maturity by increasing the number of business-critical systems with continuous, forensic-level monitoring and reducing the time it takes to produce quality, audit-ready compliance reports, among numerous other benefits.

With the ExtraHop Zero Trust Extension for Netskope, organizations can maintain zero trust access to their networks without compromising security or performance for cloud apps and remote teams. Teams gain real-time visibility into network traffic crossing the SSE, along with the granular, packet-level data needed to assess and resolve issues at the speed of business. That’s a rare win-win for these teams and a big loss for attackers.

WordPress Appliance - Powered by TurnKey Linux