sb-au logo
Story image

How to balance collaboration and security on Workplace by Facebook

30 Oct 2018

The proliferation of cloud collaboration tools like Dropbox, Microsoft Teams, and Slack have allowed businesses to be more flexible than ever before.

However, as it gets easier for employees to remotely access sensitive company information, security professionals need to shift their focus from the network perimeter to insider threats to keep up.

If left unaddressed, enterprises can find themselves noncompliant and at a high risk of data loss or threats.

One of the cloud collaboration tools that has seen rapid adoption is Workplace by Facebook, with 30,000 companies worldwide using the platform.

These are companies spanning multiple industries - retail, technology, telecommunications, financial services, media, entertainment, food and beverage, transportation, real estate, utilities, shipping and government.

It has the benefit of Facebook's years of platform refinement, and virtually no learning curve for Facebook users.

With its familiar interface, it’s easy for employees to be lulled into a false sense of security regarding information that can be shared and discussed on Workplace by Facebook.

Netskope for Workplace provides security teams deep insight into and control over files and data shared in Workplace, safeguards valuable intellectual property, ensures regulatory compliance, and protects against threats like as malware and ransomware.

Netskope was the first cloud security solutions provider in the market to secure the Workplace by Facebook platform.

Netskope for Workplace protects sensitive data and defends against threats so teams can work together while remaining safe and compliant.

Granular visibility into Workplace usage and risk

Netskope for Workplace allows administrators to drill down on users, activities, devices, and more accessing Workplace by Facebook.

This allows them to delve into files and messages that contain data violations and be alerted to these violations, perform ad-hoc queries, or create reports of relevant access and usage information for compliance.

Granular control of Workplace users, activities, and data

Administrators can create granular, contextual policies by app, user, activity, device, and more.

They can perform actions like coaching with custom user messages or blocking of activities — all in real time, they can create policies such as “Users cannot upload sensitive data such as PII into Workplace.”

Advanced, enterprise cloud data loss protection (DLP)  

Netskope lets administrators detect data violations in transit or at rest in Workplace with industry-leading cloud DLP.

They can uncover and protect content containing sensitive data using pre-built profiles such as personally identifiable information (PII), payment card industry data (PCI), protected health information (PHI), source code, profanity, and more.

Alternatively, administrators can custom-build DLP profiles using Netskope’s robust set of advanced cloud DLP features such as 3,000+ data identifiers, 500+ file types, support for language agnostic double-byte characters, custom regular expressions, pattern matching, proximity analysis, fingerprinting, and exact match.

Cloud threat and malware protection

Netskope for Workplace can detect and respond to usage anomalies using Netskope’s machine learning- and rules-based anomaly detection.

Administrators can see logins from different locations, be alerted to data exfiltration, know when users’ credentials have been compromised, and understand privileged user threats.

Using Netskope’s anti-malware capabilities, they can detect and block cloud malware in real-time activities to prevent upload of infected files.

Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Link image
Phishing campaigns aren't stopping - but neither are their opponents
COVID-19 is presenting the perfect opportunity to cyber attackers to mount potentially devastating spear-phishing campaigns against organisations via their remote workers. Learn how to fight back.More
Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More
Story image
Remote staff overestimating knowledge of cybersecurity basics
‘Unconscious incompetence’ is one of the most difficult issues to identify and solve with security awareness training.More
Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.More