Story image

How to balance collaboration and security on Workplace by Facebook

30 Oct 18
Sponsored

The proliferation of cloud collaboration tools like Dropbox, Microsoft Teams, and Slack have allowed businesses to be more flexible than ever before.

However, as it gets easier for employees to remotely access sensitive company information, security professionals need to shift their focus from the network perimeter to insider threats to keep up.

If left unaddressed, enterprises can find themselves noncompliant and at a high risk of data loss or threats.

One of the cloud collaboration tools that has seen rapid adoption is Workplace by Facebook, with 30,000 companies worldwide using the platform.

These are companies spanning multiple industries - retail, technology, telecommunications, financial services, media, entertainment, food and beverage, transportation, real estate, utilities, shipping and government.

It has the benefit of Facebook's years of platform refinement, and virtually no learning curve for Facebook users.

With its familiar interface, it’s easy for employees to be lulled into a false sense of security regarding information that can be shared and discussed on Workplace by Facebook.

Netskope for Workplace provides security teams deep insight into and control over files and data shared in Workplace, safeguards valuable intellectual property, ensures regulatory compliance, and protects against threats like as malware and ransomware.

Netskope was the first cloud security solutions provider in the market to secure the Workplace by Facebook platform.

Netskope for Workplace protects sensitive data and defends against threats so teams can work together while remaining safe and compliant.

Granular visibility into Workplace usage and risk

Netskope for Workplace allows administrators to drill down on users, activities, devices, and more accessing Workplace by Facebook.

This allows them to delve into files and messages that contain data violations and be alerted to these violations, perform ad-hoc queries, or create reports of relevant access and usage information for compliance.

Granular control of Workplace users, activities, and data

Administrators can create granular, contextual policies by app, user, activity, device, and more.

They can perform actions like coaching with custom user messages or blocking of activities — all in real time, they can create policies such as “Users cannot upload sensitive data such as PII into Workplace.”

Advanced, enterprise cloud data loss protection (DLP)  

Netskope lets administrators detect data violations in transit or at rest in Workplace with industry-leading cloud DLP.

They can uncover and protect content containing sensitive data using pre-built profiles such as personally identifiable information (PII), payment card industry data (PCI), protected health information (PHI), source code, profanity, and more.

Alternatively, administrators can custom-build DLP profiles using Netskope’s robust set of advanced cloud DLP features such as 3,000+ data identifiers, 500+ file types, support for language agnostic double-byte characters, custom regular expressions, pattern matching, proximity analysis, fingerprinting, and exact match.

Cloud threat and malware protection

Netskope for Workplace can detect and respond to usage anomalies using Netskope’s machine learning- and rules-based anomaly detection.

Administrators can see logins from different locations, be alerted to data exfiltration, know when users’ credentials have been compromised, and understand privileged user threats.

Using Netskope’s anti-malware capabilities, they can detect and block cloud malware in real-time activities to prevent upload of infected files.

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.