Continuous security assessment
Grâce à une unique console intuitive, surveillez et évaluez vos configurations de sécurité, ressources et services, pour tous vos clouds publics.
Lire la suite
Continuous security assessment across AWS, Azure and GCP
- Continuously monitors and audits your cloud configurations, using industry standards, CIS benchmarks and best practices such as NIST, PIC_DSS, HIPAA and more
- Combines API-based and real-time inline protection for securing public clouds
- Offers role-based access controls (RBAC) dedicated to use cases
- Identifies and can automatically remediate common misconfigurations that could inadvertently expose resources to the Internet and make them vulnerable to attack
- Provides automated workflows and expert recommendations to improve security posture and ensure compliance
- Offers predefined and custom compliance reports for auditors and internal teams
- Une seule console dotée de contrôles unifiés des politiques pour AWS, Azure et GCP
Advanced data loss prevention (DLP)
Identify and protect sensitive data stored within your AWS, Azure, and GCP clouds as well as monitor and control data in motion between cloud services – enhancing visibility into cloud native audit logs, VPC flow logs and other data sources.
Lire la suite
Advanced data loss prevention (DLP)
- Protects your data at rest and data in motion
- Offers predefined regulatory and best practices compliance templates
- Uses 3000+ language-independent data identifiers to inspect 1400+ file types
- Identifies and blocks any attempts by users to upload data to an unmanaged storage bucket or blob, whether via the cloud provider’s GUI or executing a programmatic copy and sync in the CLI (See demo)
- Feeds API-based insights into Netskope Security Cloud policies for inline enforcement
- Includes file and binary fingerprinting as well as Optical Character Recognition (OCR)
- Provides exact data matching for structured content
- Uses machine learning based document and image classification for high efficiency
Protection contre les menaces internes
Detect and stop threats and data loss from malicious insiders using a unique combination of API-enabled and inline controls.
Lire la suite
Detect and stop insider threats
- Creates and enforces policies prohibiting data exfiltration from managed corporate storage services to personal, unmanaged storage services
- Uses UEBA to defend against insider threats such as data exfiltration, compromised credentials and malware
- Identifies and prevents risky activity and anomalies like bulk downloads or copies of data – whether using the the AWS console, CLI or third-party app
- Autorisation des copies/synchronisations de compartiments gérés et « détenus par l'entreprise »
- Blocks or restricts the copy / sync of buckets that are not “corporate owned” and managed
Protection avancée contre les menaces (ATP)
Utilize multi-layer threat detection including static and dynamic anti-virus inspection, anti-malware, user and entity behavior analytics (UEBA), heuristic analysis, sandboxing analysis and more, to uncover elusive and advanced attacks.
Lire la suite
- Provides automated policies and workflows for real-time response to stop or reverse the effects of cloud threats
- Améliorations et mises à jour continues par le Netskope Threat Research Labs
- Conducts real-time, full file inspection to detect and block malware
- Provides rich metadata for SOC investigations and threat hunting
- Use machine learning anomaly detection to expedite and simplify threat response
- Utilizes 40+ threat intelligence (TI) feeds, plus custom IOC hash and URL feeds, and shares TI via STIX/TAXII formats
- Offers an open REST API for EDR, SIEM, SOAR, and 3rd party integrations
Real time inline visibility and control
Monitor and protect your public cloud resources in real time using granular controls that identify and restrict access between managed and unmanaged “shadow IaaS” services.
Lire la suite
See and control activities in real time across your clouds
- Enhances visibility into cloud and data activity using a combination of both real-time and API-enabled controls
- Decodes activities in real-time using Netskope Cloud XD and places activity-level restrictions for users, groups, and OUs across a 80+ public cloud services
- Provides visibility and control of actions performed via the cloud provider’s management console and CLI
Secure access to private applications
Secure access to applications within your public clouds using zero trust network access (ZTNA) capabilities to mitigate public exposure of private applications while avoiding the need to inefficiently “hairpin” access back through a corporate data center.
Lire la suite
Netskope Private Access secures access to applications in public clouds
- Provides secure connectivity between remote users’ devices and private applications using end-to-end TLS (v1.3) encrypted tunnels
- Supports multiple application access methods including browser-based (e.g. HTTP/HTTPS) and non-web / thick applications (e.g. SSH, RDP)
- Ensures only authenticated and authorized users can gain access to select private applications
- Integrates with Microsoft Active Directory and Single Sign-On (SSO) providers to understand users, groups and organizational units
- Ensures that only corporate, managed devices meeting a specific security posture can access private applications
- Provides inline, granular policies for restricting or allowing access to private applications based on criteria including User, Group or Organizational Unit (OU); Device Classification; or Operating System
- Offers optimal routing through Netskope NewEdge – a low-latency, high-capacity, scalable global network infrastructure