Story image

How to balance collaboration and security on Workplace by Facebook

30 Oct 18
Sponsored

The proliferation of cloud collaboration tools like Dropbox, Microsoft Teams, and Slack have allowed businesses to be more flexible than ever before.

However, as it gets easier for employees to remotely access sensitive company information, security professionals need to shift their focus from the network perimeter to insider threats to keep up.

If left unaddressed, enterprises can find themselves noncompliant and at a high risk of data loss or threats.

One of the cloud collaboration tools that has seen rapid adoption is Workplace by Facebook, with 30,000 companies worldwide using the platform.

These are companies spanning multiple industries - retail, technology, telecommunications, financial services, media, entertainment, food and beverage, transportation, real estate, utilities, shipping and government.

It has the benefit of Facebook's years of platform refinement, and virtually no learning curve for Facebook users.

With its familiar interface, it’s easy for employees to be lulled into a false sense of security regarding information that can be shared and discussed on Workplace by Facebook.

Netskope for Workplace provides security teams deep insight into and control over files and data shared in Workplace, safeguards valuable intellectual property, ensures regulatory compliance, and protects against threats like as malware and ransomware.

Netskope was the first cloud security solutions provider in the market to secure the Workplace by Facebook platform.

Netskope for Workplace protects sensitive data and defends against threats so teams can work together while remaining safe and compliant.

Granular visibility into Workplace usage and risk

Netskope for Workplace allows administrators to drill down on users, activities, devices, and more accessing Workplace by Facebook.

This allows them to delve into files and messages that contain data violations and be alerted to these violations, perform ad-hoc queries, or create reports of relevant access and usage information for compliance.

Granular control of Workplace users, activities, and data

Administrators can create granular, contextual policies by app, user, activity, device, and more.

They can perform actions like coaching with custom user messages or blocking of activities — all in real time, they can create policies such as “Users cannot upload sensitive data such as PII into Workplace.”

Advanced, enterprise cloud data loss protection (DLP)  

Netskope lets administrators detect data violations in transit or at rest in Workplace with industry-leading cloud DLP.

They can uncover and protect content containing sensitive data using pre-built profiles such as personally identifiable information (PII), payment card industry data (PCI), protected health information (PHI), source code, profanity, and more.

Alternatively, administrators can custom-build DLP profiles using Netskope’s robust set of advanced cloud DLP features such as 3,000+ data identifiers, 500+ file types, support for language agnostic double-byte characters, custom regular expressions, pattern matching, proximity analysis, fingerprinting, and exact match.

Cloud threat and malware protection

Netskope for Workplace can detect and respond to usage anomalies using Netskope’s machine learning- and rules-based anomaly detection.

Administrators can see logins from different locations, be alerted to data exfiltration, know when users’ credentials have been compromised, and understand privileged user threats.

Using Netskope’s anti-malware capabilities, they can detect and block cloud malware in real-time activities to prevent upload of infected files.

Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more. 
Dell EMC advances hybrid cloud for VMware environments
Through collaboration and joint engineering, Dell EMC and VMware are enabling organisations to derive more value from IT investments.
ThreatQuotient partners with Visa for payments safety
“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.”
Gartner names Bitglass a leader in cloud security
Bitglass was evaluated based on its ability to execute and its completeness of vision.
Universities seeing rise in DDoS attacks
Overall, between July and September, DDoS botnets attacked targets in 82 countries.
Security cameras – a latent botnet network?
In a comparison of 16 indoor and outdoor IP surveillance cameras, researchers found only one well-protected device.
2018’s worst malware revealed in report
Webroot has highlighted the top cyberattacks of 2018 in its latest Nastiest Malware list, which showcases the malware and attack payloads that have been most detrimental to organisations.
How phishing is evolving to outpace awareness
While email providers have made strides in flagging suspicious emails and source domains, reducing the effectiveness of attacks, attackers’ techniques have also evolved.