Netskope extends data security with Dasera acquisition

Netskope today announced it has broadened its data protection capabilities by integrating data security posture management (DSPM) technology into its Netskope One Platform via its acquisition of Dasera. The integration will help the company deliver advanced security across web, SaaS, PaaS, IaaS, email, endpoint, and on-premises use cases—now including structured, semi-structured, and unstructured data stores and data lakes, Netskope says.

Dasera, founded in 2019, created a product focused on finding and assessing data in structured and semi-structured data sets stored in hyperscaler platforms such as AWS and Azure, platform-as-a-service repositories such as Databricks and Snowflake, and in on-premises data stores.

“An enterprise’s modern data security strategy aims to holistically know and control where their data is, what this data is, how it got there, the posture of the data store, how sensitive data is being used, who or what has access to it, and how to ensure real-time and granular data policies are enforced,” said Sanjay Beri, CEO and co-founder, Netskope, said in a statement. “Our goal has always been to enable this modern data security strategy by bringing the broadest and deepest data protection using a single, holistic platform, which we call Netskope One. In my dialogue with security leaders around the world in the past months, it is clear that they are excited for DSPM capabilities to be part of the Netskope One platform.”

DSPM capabilities can help organizations protect their data from unauthorized access, loss, or misuse, by identifying sensitive data across cloud environments and services and assessing the risk of data being compromised by security threats and regulatory non-compliance. Netskope previously integrated digital experience monitoring capabilities last year when it acquired Kadiska and incorporated DEM into its SASE platform.

“The last thing [customers] want is yet another point solution trying to tackle one part of the data protection problem—so, having a truly unified platform like Netskope One to cover the breadth and depth of their use cases across web, cloud, email, endpoint, on-prem, and wherever their data is has been very appealing,” Netskope’s Beri said in a statement.

The Netskope DSPM module will be generally available as part of the Netskope One platform immediately.

Read more about SASE

  • Cato Networks extends SASE platform with digital experience monitoring: Cato DEM gives IT teams visibility into application traffic and tools for optimizing network performance issues.
  • Netskope’s SASE upgrade targets user experience, network forensics: The latest version of the Netskope One SASE platform gives IT teams tools to improve network visibility and boost performance for distributed employees.
  • Fortinet expands security lineup with sovereign SASE: The new Fortinet Sovereign SASE offering provides a delivery option that lets organizations maintain local control over security inspection and logs.
  • Buyer’s guide: SASE and SSE: SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer SASE services, but what they actually provide and how they provide it varies widely.
  • Palo Alto extends SASE security, performance features: The latest version of Prisma SASE, version 3.0, includes a number of core upgrades, including the ability to secure unmanaged devices through a new, integrated Prisma Access Browser that features least privilege access, constant security inspection, and other zero-trust capabilities.
  • Why is the transition from SD-WAN to SASE so painful? The transition from software-defined WAN to secure access service edge is proving to be difficult for many enterprises, according to new research from Enterprise Management Associates.
  • Enterprises turn to single-vendor SASE for ease of manageability: Getting the full SASE stack of networking and security capabilities from a single vendor can simplify deployment and management, but there are downsides to consider.

Source:: Network World