
Protect against sensitive data leakage, cloud threats, and risks associated with non-compliant behavior in your managed cloud applications, such as Office 365, Box, DropBox or any of the more than 36,000 cloud services available.
Vendor
Netskope
Company Website
Govern usage in your managed cloud services
Gain real-time, granular visibility and control over all your managed cloud services with Netskope. Use rich, contextual details around your cloud usage, including users, devices, activities, and data to create policies that best mitigate your risks.
Protect data and control activities in your managed applications
Gain full visibility and control
Take advantage of Netskope’s all-mode architecture, which gives you a comprehensive set of deployment options that enable you to have full visibility and control over all your managed applications. The unique Netskope all-mode architecture offers you an array of deployment options to gain visibility and control over your managed cloud services, whether your users are on premises or remote, using a web browser, mobile app, or sync client. Options include out-of-band API protection for selected cloud services, like Office 365 and Salesforce, as well as forward and reverse proxy modes for real-time policy controls for any cloud service.
- Provide direct, out-of-band connection into selected cloud services with API protection
- Cover cloud service access from outside your network with a reverse proxy
- Cover any cloud service with forward proxy
- Combine different modes to expand your coverage
Establish policies based on context
Leverage a deep understanding of how your managed applications operate, so you can create the right level of security policies to ensure your cloud usage is safe. Netskope gives you granular visibility and control over your cloud services. Rather than taking a coarse-grained approach that blocks services entirely, Netskope gives you a deep understanding of your cloud service usage and allows you to define targeted security policies based on user, application, instance, risk, identity, service, activity, and data.
- Define policy actions, including block, alert, encrypt, quarantine, and coach
- Distinguish between different cloud service instances
- Mitigate risk of inappropriate sharing and public links
- Mix and match policy elements to carve out risk without blocking services
Protect your data
Use Netskope’s comprehensive data loss prevention (DLP) capabilities to protect your sensitive data from being exfiltrated from your managed cloud services, in real-time. Netskope One DLP protects sensitive data in the cloud with the ability to inspect all managed and unmanaged cloud services, as well as traffic to websites. Sensitive content is detected across 1,000+ file types, across structured and unstructured data, using 3,000+ data identifiers, metadata extraction, proximity analysis, fingerprinting, and exact match.
- Control sensitive data in your managed cloud services and en route to and from all cloud services and websites
- Get the highest degree of accuracy with fingerprinting and exact match
- Further increase accuracy with keyword dictionaries, global data identifiers, and more
- Create targeted DLP policies using context like user, group, device, service, and activity
Prevent threats
Achieve multi-layered threat detection that prevents malicious malware from breaching your organization. Netskope provides multi-layered threat protection that prevents malware and advanced threats from breaching your organization. Defences include anti-malware, pre-execution script analysis, sandboxing and anomaly detection.
- Use content and context aware policies to block rogue instances for cloud phishing and cloud hosting payloads
- Detect access compromise and insider threats with user and entity behavior analysis (UEBA)
- Detect attacks using cloud-based sandboxing.
- Leverage 40+ threat intelligence feeds, plus custom IOC hash and URL feeds
- Use 90 days of rich metadata (default); longer by contract for investigations and threat hunting
- Extend functionality with open API for EDR, SIEM, SOAR, and third party integrations.
Maintain data privacy
Protect sensitive data by encrypting content to ensure that you always have full control – files are encrypted in real-time, without impacting user productivity. Netskope enables you to protect your sensitive content as it leaves your perimeter and moves into a managed cloud service, allowing you to retain full control. Netskope provides strong encryption capabilities to ensure confidentiality of content stored in the cloud. Files can be selectively encrypted in flight or encrypted as they are stored in your managed cloud service.
- Uses AES-256 with a per-file key controlled by fault-tolerant, FIPS 140-2 Level 3 certified HSMs
- Can integrate Netskope Encryption with your on-premises, KMIP-compliant key management system to ensure that you retain control of the keys.
- Ensure 360° coverage, with real-time, in-flight protection, as well as offline and retroactive, near real-time protection.
Validate compliance
Security teams can quickly identify and remediate misconfigurations using Netskope One SSPM and align the organization’s SaaS security posture with best practices and compliance standards. In addition to detecting misconfigurations and configuration drift, SSPM integrates seamlessly into the Netskope One platform providing protection for data at rest, and visibility, compliance and validation for settings and rules. For example, Netskope SSPM can detect security violations, ensure compliance with common standards including CIS, PCI-DSS, NIST, HIPAA and more, and provide step-by-step instructions for guided remediation. Netskope SSPM includes support for Microsoft 365, Salesforce, GitHub, Zoom and ServiceNow.
- Continuously detect potentially risky settings, misconfigurations, and configuration drift by comparing against predefined best practice rules and industry standards like CIS, NIST, HIPAA, PCI, CSA, etc.
- Write custom rules and define custom profiles to fit your organization’s specific needs and customize pre-built rules to your needs.
- Quickly resolve risky configurations with built-in guided remediation and resolve security risks.
- Centralized visibility to monitor settings across SaaS applications.
- Prevent disruption to business workflow with API-enabled protection and continuous monitoring.