Story image

How to balance collaboration and security on Workplace by Facebook

30 Oct 18
Sponsored

The proliferation of cloud collaboration tools like Dropbox, Microsoft Teams, and Slack have allowed businesses to be more flexible than ever before.

However, as it gets easier for employees to remotely access sensitive company information, security professionals need to shift their focus from the network perimeter to insider threats to keep up.

If left unaddressed, enterprises can find themselves noncompliant and at a high risk of data loss or threats.

One of the cloud collaboration tools that has seen rapid adoption is Workplace by Facebook, with 30,000 companies worldwide using the platform.

These are companies spanning multiple industries - retail, technology, telecommunications, financial services, media, entertainment, food and beverage, transportation, real estate, utilities, shipping and government.

It has the benefit of Facebook's years of platform refinement, and virtually no learning curve for Facebook users.

With its familiar interface, it’s easy for employees to be lulled into a false sense of security regarding information that can be shared and discussed on Workplace by Facebook.

Netskope for Workplace provides security teams deep insight into and control over files and data shared in Workplace, safeguards valuable intellectual property, ensures regulatory compliance, and protects against threats like as malware and ransomware.

Netskope was the first cloud security solutions provider in the market to secure the Workplace by Facebook platform.

Netskope for Workplace protects sensitive data and defends against threats so teams can work together while remaining safe and compliant.

Granular visibility into Workplace usage and risk

Netskope for Workplace allows administrators to drill down on users, activities, devices, and more accessing Workplace by Facebook.

This allows them to delve into files and messages that contain data violations and be alerted to these violations, perform ad-hoc queries, or create reports of relevant access and usage information for compliance.

Granular control of Workplace users, activities, and data

Administrators can create granular, contextual policies by app, user, activity, device, and more.

They can perform actions like coaching with custom user messages or blocking of activities — all in real time, they can create policies such as “Users cannot upload sensitive data such as PII into Workplace.”

Advanced, enterprise cloud data loss protection (DLP)  

Netskope lets administrators detect data violations in transit or at rest in Workplace with industry-leading cloud DLP.

They can uncover and protect content containing sensitive data using pre-built profiles such as personally identifiable information (PII), payment card industry data (PCI), protected health information (PHI), source code, profanity, and more.

Alternatively, administrators can custom-build DLP profiles using Netskope’s robust set of advanced cloud DLP features such as 3,000+ data identifiers, 500+ file types, support for language agnostic double-byte characters, custom regular expressions, pattern matching, proximity analysis, fingerprinting, and exact match.

Cloud threat and malware protection

Netskope for Workplace can detect and respond to usage anomalies using Netskope’s machine learning- and rules-based anomaly detection.

Administrators can see logins from different locations, be alerted to data exfiltration, know when users’ credentials have been compromised, and understand privileged user threats.

Using Netskope’s anti-malware capabilities, they can detect and block cloud malware in real-time activities to prevent upload of infected files.

Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).