cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope debuta como Líder en el Cuadrante Mágico™ de Gartner® para Single-Vendor SASE
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Libro SD-WAN moderno para principiantes de SASE
                  Modern SD-WAN for SASE Dummies
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                            Netskope GovCloud
                            Netskope logra la alta autorización FedRAMP
                            Elija Netskope GovCloud para acelerar la transformación de su agencia.
                              Let's Do Great Things Together
                              La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.
                                Soluciones Netskope
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Soporte técnico Netskope
                                  Soporte técnico Netskope
                                  Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                                    Vídeo de Netskope
                                    Netskope Training
                                    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                                      Vulnerability Disclosure Policy

                                       

                                      Definition

                                      Netskope takes the protection of our customers’ information and the products and services Netskope provides to them very seriously.

                                       

                                      Netskope wants security researchers to feel comfortable reporting vulnerabilities they’ve discovered, as set out in this policy so that Netskope can remediate them and help us keep Netskope products and information safe.

                                       

                                      This policy describes what systems and types of research are covered under this policy, how to send us vulnerability reports, and how long Netskope asks security researchers to wait before disclosing any vulnerabilities.

                                       

                                       

                                      Compliance

                                      If you comply with this policy during your security research and do not compromise the security of Netskope systems, Netskope’s customers’ data, or the safety or privacy of Netskope users, Netskope will work with you to understand and resolve the issue quickly and will not initiate or recommend legal action related to your research.

                                       

                                      Netskope will be using your Name and Mail id (if required) while making public disclosures. Due to privacy concerns, If you do not wish to use the same, please notify Netskope in advance.

                                       

                                       

                                      Guidelines

                                      Netskope requires you to:

                                      • Notify Netskope as soon as possible once you discover a real or potential security issue.
                                      • Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and any access, copying, destruction or manipulation of data.
                                      • Only use exploits to the extent necessary to confirm a vulnerability. Do not use an exploit to compromise or exfiltrate data, establish command line access and/or persistence, or use the exploit to “pivot” to other systems.
                                      • Once you’ve established that a vulnerability exists, or encountered any of the sensitive data outlined below, you must stop your test and notify us immediately.
                                      • Keep confidential any information about discovered vulnerabilities until announced by Netskope. For details, please review the Coordinated Disclosure section.
                                      • Netskope encourages a coordinated public disclosure of security issues and expects security researchers to provide Netskope a reasonable time to fix the security issue before making any disclosure, public or otherwise.

                                       

                                       

                                      Scope

                                      This policy applies to all the products, services and infrastructure developed, managed and maintained by Netskope.

                                       

                                      Additionally, vulnerabilities found in Netskope service providers’ systems fall outside of this policy’s scope and should be reported directly to the service provider according to their disclosure policy (if any). If you are not sure whether a system or endpoint is in scope or not, contact us at [email protected] before starting your research.

                                       

                                      A subset of these systems may be eligible for bounties. Check Netskope’s program page on BugCrowd for the current list of bounty-eligible systems.

                                       

                                       

                                      Rules of Engagement

                                      The following test types are not authorized:

                                      • User interface bugs or typos.
                                      • Engage in Social Engineering.
                                      • Introducing or adding a malware/malicious software.
                                      • Network denial of service (DoS or DDoS) tests.
                                      • Physical testing (e.g., office access, open doors, tailgating), social engineering (e.g., phishing, vishing), or any other non-technical vulnerability testing.

                                       

                                      If you encounter any of the below on Netskope systems while testing within the scope of this policy, stop your test and notify us immediately:

                                      • Personal Identifiable Information (PII)
                                      • Customer Data or Account Credentials
                                      • Financial information (e.g., credit card or bank account numbers)
                                      • Proprietary information or trade secrets of companies of any party
                                      • Denial of Service or situations where the site and application are not responding

                                       

                                       

                                      Reporting a Vulnerability

                                      Netskope accepts vulnerability reports via below channels –

                                      • Through BugCrowd (www.bugcrowd.com). If BugCrowd is not open or available please share any vulnerabilities with [email protected] and Netskope will work to get you recognition via BugCrowd when it becomes available.
                                      • Directly to Netskope via email using [email protected]

                                       

                                      Note: Netskope does not support PGP-encrypted emails. For particularly sensitive information,we ask that you submit through the Netskope’s BugCrowd program. Reports may be submitted anonymously.

                                       

                                      Netskope prefers reports via BugCrowd but will respond to reports through any of the above channels. Note, only the reports submitted via BugCrowd will be eligible for bounties, except in the event that BugCrowd is not open or available, as noted above.

                                       

                                      Reports should include:

                                      • Description of the location and potential impact of the vulnerability.
                                      • A detailed description of the steps required to reproduce the vulnerability. Proof of concept (POC) scripts, screenshots, and screen captures are all helpful. Please use extreme care to properly label and protect any exploit code.
                                      • Any technical information and related materials Netskope would need to reproduce the issue.
                                      • Associated CWEs and Risk Rating such as Base CVSS (if applicable).

                                       

                                      Please keep vulnerability reports current by sending Netskope any new information as it becomes available.

                                       

                                      Note: Netskope may share your vulnerability reports with US-CERT, as well as any affected vendors or open source projects.

                                       

                                       

                                      Coordinated Disclosure

                                      Netskope is committed to patching vulnerabilities in a timely manner based upon the severity of the vulnerability and disclosing the details of those vulnerabilities when patches are published. Netskope knows that public disclosure of vulnerabilities can be an essential part of the vulnerability disclosure process and that one of the best ways to make software better is to enable everyone to learn from each other’s mistakes.

                                       

                                      At the same time, disclosure in absence of a readily available patch may increase risk rather than reduce it, and so Netskope asks that you refrain from sharing your report with others while Netskope works on a patch. If you
                                      believe there are others that should be informed of your report before the patch is available, please let us know so Netskope may consider other arrangements.

                                       

                                      Netskope recognizes that self-disclosure of bugs may be of interest to you and does not take issue with this practice. Netskope asks that any self-disclosure publication be coordinated with the release of required patches
                                      and in conjunction with Netskope’s advisory communications efforts. Note that in some cases there may be sensitive information that Netskope will require you to redact, so please review with Netskope before self-disclosing.

                                       

                                       

                                      Questions

                                      For any questions on the policy and for further help, please write to us at [email protected].

                                       

                                      Note: Netskope reserves the right to update the policy at any time.