Netskope vuelve a ser reconocido como Líder en el Cuadrante™ Mágico de Gartner® para plataformas SASE. Obtener el Informe

cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
Descubra Netskope
Ponte manos a la obra con la plataforma Netskope
Esta es su oportunidad de experimentar de primera mano la Netskope One plataforma de una sola nube. Regístrese para participar en laboratorios prácticos a su propio ritmo, únase a nosotros para una demostración mensual del producto en vivo, realice una prueba de manejo gratuita de Netskope Private Accesso únase a nosotros para talleres en vivo dirigidos por instructores.
Líder en SSE. Ahora es líder en SASE de un solo proveedor.
Netskope ha sido reconocido como Líder con mayor visión tanto en plataformas SSE como SASE
2X líder en el Cuadrante Mágico de Gartner® para SASE Plataforma
Una plataforma unificada creada para tu viaje
Protección de la IA generativa para principiantes
Protección de la IA generativa para principiantes
Descubra cómo su organización puede equilibrar el potencial innovador de la IA generativa con sólidas prácticas de seguridad de Datos.
Prevención de pérdida de datos (DLP) moderna para dummies eBook
Prevención moderna de pérdida de datos (DLP) para Dummies
Obtenga consejos y trucos para la transición a una DLP entregada en la nube.
Libro SD-WAN moderno para principiantes de SASE
SD-WAN moderna para maniquíes SASE
Deje de ponerse al día con su arquitectura de red
Entendiendo dónde está el riesgo
Advanced Analytics transforma la forma en que los equipos de operaciones de seguridad aplican los conocimientos basados en datos para implementar una mejor política. Con Advanced Analytics, puede identificar tendencias, concentrarse en las áreas de preocupación y usar los datos para tomar medidas.
Soporte técnico Netskope
Soporte técnico Netskope
Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
Vídeo de Netskope
Netskope Training
La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

Infinipoint and Netskope Partner to Integrate Device Identity with Zero Trust Access

Sep 03 2021

In the past year, IT services have gone through a world of change. There are more remote workers, hybrid work models, cloud services, and mobile devices. It is finally safe to say that the classic perimeter no longer exists. In fact, you might go one step further and say that identity is the new perimeter. 

The ability for end-users to access any applications from any device from anywhere has put securing identities and their access privileges near the top of any Zero Trust security strategy. But the term “identity” does not just apply to the user. It also applies to the device that is used to access corporate services and data. 

Infinipoint and Netskope have partnered to enable the application and enforcement of a true Zero Trust user and device access policy.  The joint solution integrates Infinipoint Device-Identity-as-a-Service (DIaaS) with Netskope to deliver a comprehensive security solution for Zero Trust device access. 

Device Identity meets Zero Trust access

Zero Trust reference architectures from U.S. Department of Defense (DOD), NIST, and others are prioritizing more granular security controls for user devices to protect critical data and services. For example, the U.S. DOD Zero Trust Reference Architecture specifically calls out “the ability to identify, authenticate, authorize, inventory, isolate, secure, remediate, and control all devices” as “essential in a Zero Trust approach”. 

The DOD recommends device security posture checks that include “examinations of compromise state, anomaly detection, software versions, protection status, encryption enablement” and also the ability to provide real-time remediation options for out-of-compliance devices.

This is where the Infinipoint and Netskope integration comes into play. Infinipoint complements Netskope by integrating device state, risk-based policies, and one-click remediation for non-compliant devices. This allows network and security operations teams to verify a predefined device security posture, extend adaptive access and enable auto-remediation as part of the user access flow.

Adaptive access control – The key to business continuity

Moving to a more granular, Zero Trust approach for user and device access is a solid strategy to reduce the attack surface and protect critical corporate services and data. But any security policy model has to balance the need to protect with the need to maintain business continuity. Simply put, you can’t just block access to users and devices every time a policy requirement has not been met. 

Infinpoint extends Netskope adaptive access controls, enabling governed access permissions in real-time based on device context. For example, you can allow read-only access to services, or prevent files from being downloaded for users connecting via non-compliant devices. This provides an adaptive Zero Trust approach in a productive way that maintains business continuity with no disruption of access to the workforce.

In addition, Infinipoint combined with Netskope can enable conditional access, where only compliant devices access sensitive services and data. For example, you can create a device identity policy where only devices with the latest Windows security update are allowed access to confidential files and sensitive data. 

Lastly, for unmanaged Netskope devices, Infinipoint enables a posture check and one-click remediation for installation of the Netskope client. 

Better together

Infinipoint Device-Identity-as-a-Service (DIaaS) integration with Netskope delivers a comprehensive security solution for Zero Trust device access. Infinipoint complements Netskope by integrating device state, risk-based policies, and one-click remediation for non-compliant devices. This integration enables you to verify device security posture, extend adaptive access and enable auto-remediation as part of Netskope user access flow.

Enabling device compliance with uninterrupted user access with one-click remediation not only enables user productivity but also prevents potential breaches due to vulnerable and non-compliant devices accessing corporate services and data. The result is an adaptive Zero Trust approach to device access while maintaining business continuity with no disruption to the workforce. 

More information

Read the Infinipoint and Netskope joint solution brief.

author image
David Willis
David is an experienced business, security, and technology leader with over 20 years across telecommunications, financial services, and software industry verticals.
David is an experienced business, security, and technology leader with over 20 years across telecommunications, financial services, and software industry verticals.
Conéctese con Netskope

Subscribe to the Netskope Blog

Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.