Skip to main content

Sift Joins Netskope, the Cloud Security Leader

Four years ago, we started Sift with the mission of simplifying security operations and incident response for the public cloud. In that time, we have assembled a fantastic team, created an innovative cloud detection and response solution, and have worked with many market-leading customers. I’m delighted to share that we’ve taken yet another step forward — as announced today, Sift is now officially part of Netskope. You can read more about this on Netskope CEO Sanjay Beri’s blog or in the official announcement on the Netskope website.

For our customers, investors, partners, and team, this is an exciting new chapter. Let me tell you why we’re so excited.  Since the beginning, Netskope has had an unmatched vision for the cloud security market. Having started in 2012, they initially focused on SaaS security and quickly followed that with IaaS security capabilities. Six years later, they are now more than 500 employees strong and used by a quarter of the Fortune 100. They are a leader in the Gartner Magic Quadrant for cloud access security brokers (CASB) and recently announced  an extension of their platform to secure the entire web. The Netskope Security Cloud has won numerous awards, including for it’s market-leading data loss prevention and threat protection. Additionally, the Netskope “one cloud” architecture and philosophy is a key differentiator that benefits customers through time savings and greater security efficacy. In addition to the great fit from a leadership and technology point of view, Netskope and Sift are very well aligned from a company culture point of view — this was one of the most important things we looked at when we started talking about joining forces with Netskope.

The combination of Netskope and Sift creates the most complete solution for IaaS security in the market, and our customers will benefit from the following as a direct result of this move:
  • Resources: Unlike other vendors where cloud security is just a portion of what they do, we now have hundreds of people focusing solely on R&D and operations. In addition, Netskope has raised  more than $230M from top VCs, including Lightspeed Venture Partners, Accel, Iconiq, and Social Capital.
  • Visibility & control for IaaS: IaaS discovery, full configuration scanning and continuous assessment for AWS, Azure, and GCP. Full data loss prevention and advanced threat protection across IaaS storage environments (blob, S3 buckets, etc.)
  • Breach detection & response: Behavioral analytics for users, resources, network, and API activity combined with graphical investigation, hunting and automated response.
  • “One Cloud” architecture: Unlike other vendors who have multiple solutions that have been brought together, Netskope was built in the cloud since day one. The “one cloud” architecture means that you don’t have to perform multiple integrations or switch between different consoles to get SaaS, IaaS, and web security. Sift will be folded into the Netskope Security Cloud and part of the “one cloud” architecture.
In summary, the news today is a wonderful conclusion of our journey as Sift and the beginning of our next adventure as part of Netskope. The combined companies will provide customers with the most comprehensive and differentiated security cloud in the market. And we’re not stopping there — the innovation and strength in the market you’ll see from Netskope in the years ahead will continue to meet the demands of an enterprise being completely transformed by the cloud. I look forward to sharing more about those developments in the future as a Netskoper.

Finally, I want to sincerely thank the team and our partners, investors, and customers who have supported Sift so far and I echo Sanjay’s sentiments in expressing how delighted we are to be joining the Netskope family.

Popular posts from this blog

Data Exfiltration from AWS S3 Buckets

You will have no doubt heard by now about the recent Booz Allen Hamilton breach that took place on Amazon Web Services – in short, a shocking collection of 60,000 government sensitive files were left on a public S3 bucket (file storage in Amazon Web Services) for all to see. We are all probably too overwhelmed to care, given all the recent breaches we have been hearing about in the news. But with this breach it was different, it involved a trusted and appointed contractor whose job it was to follow security policies, put in place to avoid such incidents. So was this incident accidental or malicious? More, later about the tools we can use to tell the difference between the two. First, lets recap what happened. The Incident According to Gizmodo , the 28GB of data that was leaked not only contained sensitive information on recent government projects, but at least a half dozen unencrypted passwords belonging to government contractors with Top Secret Clearance – meaning anyone who got

How Sift Security's Analytics Engine Detects Insider Threats

Intro We work with a lot of organizations that are worried about insider threats. Their employees require access to sensitive customer data or other proprietary information. They are worried that a careless or disgruntled employee may expose that information to outsiders. Moreover, they are worried that they might not notice it if it happened. Insider threat detection is one of the main use cases of User and Entity Behavioral Analytics (UEBA). UEBA is the practice of modeling normal user and entity behavior in order to identify anomalies indicative of a cyber threat. This post describes how Sift Security’s detection and analytics engine can be used for insider threat detection. Dataset For this post, we use the CERT insider threat tools datasets [1]. These are synthetic datasets from CERT that include background data and malicious attackers. Included are authentication, email, removable storage, and web browsing data. This post focuses on the first scenario in the r6 datasets,