close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
          Experience Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            Netskope debuts as a Leader in the Gartner® Magic Quadrant™ for Single-Vendor SASE
              Securing Generative AI for Dummies
              Securing Generative AI for Dummies
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Modern Data Loss Prevention (DLP) for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modern SD-WAN for SASE Dummies Book
                  Modern SD-WAN for SASE Dummies
                  Stop playing catch up with your networking architecture
                    Understanding where the risk lies
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                            Netskope GovCloud
                            Netskope achieves FedRAMP High Authorization
                            Choose Netskope GovCloud to accelerate your agency’s transformation.
                              Let's Do Great Things Together
                              Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskope Technical Support
                                  Netskope Technical Support
                                  Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
                                    Netskope video
                                    Netskope Training
                                    Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

                                      Infinipoint and Netskope Partner to Integrate Device Identity with Zero Trust Access

                                      Sep 03 2021

                                      In the past year, IT services have gone through a world of change. There are more remote workers, hybrid work models, cloud services, and mobile devices. It is finally safe to say that the classic perimeter no longer exists. In fact, you might go one step further and say that identity is the new perimeter. 

                                      The ability for end-users to access any applications from any device from anywhere has put securing identities and their access privileges near the top of any Zero Trust security strategy. But the term “identity” does not just apply to the user. It also applies to the device that is used to access corporate services and data. 

                                      Infinipoint and Netskope have partnered to enable the application and enforcement of a true Zero Trust user and device access policy.  The joint solution integrates Infinipoint Device-Identity-as-a-Service (DIaaS) with Netskope to deliver a comprehensive security solution for Zero Trust device access. 

                                      Device Identity meets Zero Trust access

                                      Zero Trust reference architectures from U.S. Department of Defense (DOD), NIST, and others are prioritizing more granular security controls for user devices to protect critical data and services. For example, the U.S. DOD Zero Trust Reference Architecture specifically calls out “the ability to identify, authenticate, authorize, inventory, isolate, secure, remediate, and control all devices” as “essential in a Zero Trust approach”. 

                                      The DOD recommends device security posture checks that include “examinations of compromise state, anomaly detection, software versions, protection status, encryption enablement” and also the ability to provide real-time remediation options for out-of-compliance devices.

                                      This is where the Infinipoint and Netskope integration comes into play. Infinipoint complements Netskope by integrating device state, risk-based policies, and one-click remediation for non-compliant devices. This allows network and security operations teams to verify a predefined device security posture, extend adaptive access and enable auto-remediation as part of the user access flow.

                                      Adaptive access control – The key to business continuity

                                      Moving to a more granular, Zero Trust approach for user and device access is a solid strategy to reduce the attack surface and protect critical corporate services and data. But any security policy model has to balance the need to protect with the need to maintain business continuity. Simply put, you can’t just block access to users and devices every time a policy requirement has not been met. 

                                      Infinpoint extends Netskope adaptive access controls, enabling governed access permissions in real-time based on device context. For example, you can allow read-only access to services, or prevent files from being downloaded for users connecting via non-compliant devices. This provides an adaptive Zero Trust approach in a productive way that maintains business continuity with no disruption of access to the workforce.

                                      In addition, Infinipoint combined with Netskope can enable conditional access, where only compliant devices access sensitive services and data. For example, you can create a device identity policy where only devices with the latest Windows security update are allowed access to confidential files and sensitive data. 

                                      Lastly, for unmanaged Netskope devices, Infinipoint enables a posture check and one-click remediation for installation of the Netskope client. 

                                      Better together

                                      Infinipoint Device-Identity-as-a-Service (DIaaS) integration with Netskope delivers a comprehensive security solution for Zero Trust device access. Infinipoint complements Netskope by integrating device state, risk-based policies, and one-click remediation for non-compliant devices. This integration enables you to verify device security posture, extend adaptive access and enable auto-remediation as part of Netskope user access flow.

                                      Enabling device compliance with uninterrupted user access with one-click remediation not only enables user productivity but also prevents potential breaches due to vulnerable and non-compliant devices accessing corporate services and data. The result is an adaptive Zero Trust approach to device access while maintaining business continuity with no disruption to the workforce. 

                                      More information

                                      Read the Infinipoint and Netskope joint solution brief.

                                      author image
                                      David Willis
                                      David is an experienced business, security, and technology leader with over 20 years across telecommunications, financial services, and software industry verticals.
                                      David is an experienced business, security, and technology leader with over 20 years across telecommunications, financial services, and software industry verticals.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog