IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises
Story image

Netskope announces zero trust network access updates

By Shannon Williams
Thu 23 Jun 2022

Netskope has announced key enhancements to Netskope Private Access, the zero trust network access (ZTNA) cornerstone of Netskope's security platform. 

Netskope customers can now apply zero trust principles seamlessly across a wide range of hybrid work security needs, including SaaS, IaaS, private applications, web, e-mail, and endpoint devices.

The new normal of hybrid work means enterprises are rapidly adopting Secure Access Service Edge (SASE) technology architecture. Key to SASE, ZTNA enables organisations to transition from legacy remote access VPN to a modern infrastructure that is efficient and more secure. 

Gartner predicts that by 2025, 70% of organisations that implement agent-based zero trust network access (ZTNA) will choose a security service edge (SSE) provider for ZTNA, rather than a stand-alone offering, up from 20% in 2021.

By 2026, 50% of organisations will prioritise advanced data security features for inspection of data at rest and in motion as a selection criterion for SSE, up from 15% in 2021. 

Netskope Private Access delivers ZTNA for hybrid work

Netskope Private Access, which provides ZTNA services, is a critical component of the Netskope Intelligent SSE platform. It connects users anywhere, using any device, to corporate resources everywhere and continuously evaluates context and adapts to reduce risk. With todays release, this same context has been extended to the enterprise data layer, leveraging Netskope's unified DLP capabilities. 

New and updated features of Netskope Private Access include:

Data protection. Enterprises can monitor and protect data in situations such as third-party access and employee BYOD, preventing sensitive data from leaving the corporate environment. 

Insider risk mitigation. Netskope Private Access continuously monitors application and data use, detects activities and behaviour anomalies using UEBA, and applies adaptive access policies based on user risks.   

Support for hybrid work. Netskope Private Access enables secure connection to private applications without requiring users to authenticate into a Netskope client. Among other benefits, this enables enterprises to quickly and efficiently onboard newly hired remote employees and ensure they can be productive on day one of employment, without creating security risks.

Application discovery. With improved application discovery capabilities in Netskope Private Access, network administrators gain detailed insight of private applications in use by teams, as well as the scope of individual users access and traffic patterns. 

API Automation. Netskope Private Access APIs automate the application administrative setup processes, thus efficiently enabling access to applications with adaptive access controls and policies, as well as streamlining how teams perform ongoing maintenance and application management.  

Easy accessibility from major cloud marketplaces. Publishers for Netskope Private Access are now available via the Microsoft Azure marketplace, meaning Microsoft Azure cloud customers can easily select packages to deploy Netskope Private Access with their application environment. Netskope Private Access Publishers are already available via the Amazon Web Services marketplace. 

"Enterprises need data-centric ZTNA - period. Private applications often house some of an organisations most valuable information, including trade secrets and code repositories, and are an absolute must for comprehensive data protection capabilities," says John Martin, chief product officer, Netskope. 

"These key enhancements to Netskope Private Access extend Netskope's award-winning zero trust data protection capabilities that much further, offering enterprises multiple options to protect information, from inspecting private application traffic, to applying DLP in risky use cases such as third-party access and BYOD," he says.

"Zero trust network access is all about optimising the balance of enabling access and mitigating risk, and the most effective ZTNA solutions, including Netskope Private Access, help reduce the risk and exposure associated with legacy remote access VPNs," adds Chris Rodriguez, research director, security & trust, IDC.

"Enterprises should be pleased to see that Netskope continues to innovate and has now added capabilities to strengthen data protection policies across the widest range of use cases, from SaaS to private apps."

A hybrid work environment requires the ability to apply zero trust principles to govern behaviour by users, devices, networks, applications, and data, increasing confidence in policy enforcement everywhere. Under zero trust, technology resources no longer place implicit trust in any entity that wants to connect. 

By evaluating several contextual elements -user role and identity, device identity and security posture, time of day, plus the sensitivity level of the data, and more - the resource itself can determine an appropriate level of confidence, or trust, only for that specific interaction and only for that specific resource. As a result, using Netskope Intelligent SSE with zero trust data protection applied throughout, businesses become more agile, reduce risk, and streamline application deployment and ongoing maintenance.

Netskope Private Access updates will be generally available to customers later this year. 

Related stories
Top stories
Story image
Amazon Web Services / AWS
Zscaler, AWS accelerate onramp to the cloud with zero trust
Zscaler has announced an extension to its relationship with Amazon Web Services, as well as innovations built on Zscaler's Zero Trust architecture.
Story image
Cybersecurity
Aqua Security, CIS create software supply chain security guide
Aqua Securityand the Center for Internet Security have together released the industry’s first formal guidelines for software supply chain security.
Story image
Cybersecurity
Threat actors ramp up their social engineering attacks
As people get better at identifying potential threats in their inbox, threat actors must evolve their methods. Their new M.O? Social engineering.
Story image
Commerce Commission
ComCom puts electronics sector on notice over resale price maintenance
The Commerce Commission has concluded an investigation into allegations that television manufacturers were engaging in illegal resale price maintenance.
Story image
Manufacturing
Sternum joins NXP, collaborates on IoT security and observability
Sternum has announced it has joined the software partner community of NXP Semiconductors, a manufacturer of and large marketplace for embedded controllers.
Story image
Testing
Video: 10 Minute IT Jams - An update from Tricentis
Tricentis provides software testing automation, and software quality assurance products for enterprise software.
Story image
DNS
DigiCert acquires DNS Made Easy and affiliated brands
Greg Clark comments, says, "This combination enhances the security of certificate validation and enables the automation of future validations."
Story image
Open source
DataStax secures US$115 million to fund database expansion
DataStax has secured US$115 million in funding, which it will use to develop and expand its Astra DB multi-cloud database and Astra Streaming service globally.
Story image
Microsoft
Volpara, Microsoft project to detect cardiovascular issues
Volpara Health Technologies is working with Microsoft on a research and development project to speed up creating a product that detects and quantifies breast arterial calcifications (BACs).
Story image
Secure access service edge / SASE
Cloudflare adds new capabilities to zero trust SASE platform
New features for Cloudflare One include email security protection, data loss prevention tools, cloud access security broker, and private network discovery.
Story image
INTERPOL
Hundreds arrested, millions seized in global INTERPOL investigation
A two-month-long investigation by INTERPOL this year involved 76 countries and clamped down on organised crime groups behind telecommunications and social engineering scams.
Story image
Digital Transformation
Apptio adds portfolio enhancements to promote digital strategy
"While digitalisation creates opportunities, it also makes budgeting far more complex, leading many companies to waste substantial funds."
Story image
B2B
Corpay partners with supply chain platform PracBiz Exchange
Corpay's new partnership with PracBiz’s allows more than 4000 B2B suppliers on the latter's platform to use Corpay's global payments services.
Story image
Data
How a single mandate changed software development forever
There’s conjecture about exactly when it was issued and by whom, but a mandate made twenty years ago is continuing to shape the software development process today.
Story image
Tech job moves
Tech job moves - Boomi, Limepay, Thales, VMware & Zoom
We round up all job appointments from June 6-16, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
trust
Consumers want personalisation, but don't trust brands with their data
Customers expect personalisation during every brand interaction but they don't trust brands to keep their personal data secure and to use it responsibly. 
Story image
Collaboration
IT and security team collaboration crucial to data security
Many IT and security decision makers are not collaborating as effectively as possible to address growing cyber threats.
Story image
Training
Employers look to hire inexperienced coders due to skills shortage
"Even inexperienced workers without prior qualifications or experience had managed to pivot to new roles in coding as long as they are willing to upskill."
Story image
Sustainability
Schneider Electric ups the ante on sustainability strategy
"We've made some progress but to avoid a major energy challenge, all data centres - including distributed edge data centres - must be more sustainable."
Story image
Market growth
Salesforce unveils new offerings for consumer goods companies
Salesforce has announced new products for consumer goods companies to help brands navigate increasing market complexity more easily.
Story image
Ransomware
Rapid7 report examines use of double extortion ransomware attacks
New insight into how attackers think when carrying out cyber attacks, along with further analysis of the disclosure layer of double extortion ransomware attacks, has come to light.
Story image
Dark web
Cybercrime in Aotearoa: How does New Zealand law define it?
‘Cybercrime’ is a term we hear all the time, but what exactly is it, and how does New Zealand define it in legal terms?
Story image
Citrix
The best ways to attract young talent during labour shortages
New research from Citrix reveals hybrid working and ventures into the metaverse are top of mind for Gen Z workers.
Story image
Entelar
How TruSens air purifiers can create healthier workspaces
The pandemic has heightened our awareness of our own and others’ health, and made us all much more conscious of the environments we work in.
Story image
Contact Centre
Customer service agents don't want to return to contact centres
A new report has revealed that 85% of customer service agents want to work full-time at home and not return to contact centre offices.
Story image
CRM
Microsoft launches app for modern selling experience
The new release is designed to enhance CRM systems with customer engagement data from Microsoft 365 and Microsoft Teams.
Story image
Infrastructure
Lenovo announces launch of Retail Solutions portfolio in A/NZ
Lenovo has announced the launch of its Lenovo Retail Solutions portfolio across the A/NZ region, which they say will help retailers transform their business and face future retail demands.
Story image
Hybrid workforce
Why hybrid working is here to stay and how to ace it
Citrix's new report reveals hybrid workers are more productive and engaged at work than their office and completely remote counterparts.
Story image
Orbital Insight
Orbital Insight solution set to drive better data-driven decisions
The company says the new Site Intelligence solution will provide granular visibility, behaviour analytics and deep insights about customers and competitors at any location. 
Story image
API
Industry-first comprehensive risk-based API security enhances protection
Application Programming Interfaces (APIs) have become a crucial part of operating web and mobile application businesses and are causing significant economic growth in the digital sector.
Story image
F5 Networks
Telstra, F5 team up to bolster services and solutions
“This partnership demonstrates our ongoing investment into APAC as we continue delivering high value services and solutions to our partners and customers."
Story image
Electricity
Canstar finds Flick Electric NZ’s favourite provider
Canstar’s annual research to find New Zealand’s favourite electricity provider reveals Flick Electric has come out on top.
Story image
Disaster Recovery
Eaton provides business continuity with disaster avoidance application
Many SMBs often struggle with problems relating to UPS and IT assets due to the sheer amount of time and resources required to run effectively. 
Story image
Artificial Intelligence
Salesforce harnesses automated solutions with new developments
Salesforce has launched Sales Cloud Unlimited, a new feature to help accelerate productivity with AI and automation.
Story image
Cybersecurity
Significant security concerns resulting from open source software ubiquity
"The risk is real, and the industry must work closely together in order to move away from poor open source or software supply chain security practices."
Story image
PagerDuty
Ready for anything with the PagerDuty Operations Cloud
In a world of digital everything, teams face increasing complexity. Ever-growing dependencies across systems and processes put customer and employee experience, not to mention revenue, at risk.
Story image
Healthcare
Workday winning on culture and family focus
This family-first approach sees all employees receive access to family-wide private healthcare cover, as well as income protection and life insurance policies.
Story image
Cybersecurity
Greater API usage raises concerns for protection - report
Radware has released its 2022 State of API Security report, which shows a rise in APIs, with 92% of the organisations surveyed significantly or somewhat increasing their usage.
Story image
Apple
Jamf updates healthcare IT to protect data on Apple devices
Jamf has rolled out new functionality to help healthcare and IT teams protect patient data and streamline clinical access for their Apple fleet.
Story image
Robotic Process Automation / RPA
rapidMATION helps Coates achieve success with landmark RPA solution
A strong Robotic Process Automation solution (RPA) can help solve many complex issues that businesses face daily. 
Story image
Cybersecurity
Why is NZ lagging behind the world in cybersecurity?
A recent report by TUANZ has revealed that we are ranked 56th in the world when it comes to cybersecurity - a look into why we're so behind and what needs to be done.
Story image
eInvoicing
Airwallex, Xero extend partnership with easier invoice payments
Airwallex has extended its long-term partnership with Xero by releasing a new payment link integration for Xero invoices that will make receiving them easier and faster for Australian businesses.
Story image
Infrastructure
VMware wins Google Cloud partner award for infrastructure modernisation
The cloud computing and virtualisation company was recognised for its achievements as part of the Google Cloud ecosystem.
Story image
Shouta
The rise of digital gifting in the workplace
The name itself does most of the explaining; it’s a gift you receive virtually. But a misconception about digital gifts is that they need to be redeemed virtually as well.