Get your copy of Security Service Edge (SSE) for Dummies. Get the eBook

ブログ セキュリティ変革 Understanding the Netskope Chrome OS and Chromebook Integration
Dec 09 2021

Understanding the Netskope Chrome OS and Chromebook Integration

What comes to mind when you think of security “out-of-the-box?” You’re probably looking for something that will keep users as secure as possible while minimizing implementation friction points to your users. And with ransomware, malware, and phishing threats spreading faster and costing businesses more each year, IT teams must take a full-stack approach to defend against external attacks and internal vulnerabilities, while keeping the business running.

If you consider this from the perspective of onboarding a new user, you want the process to be as simple as possible with minimal friction. And when it comes to security, there are three things that need to be top of mind:

  • The device 
  • The user
  • The action being performed

These are the three main drivers behind the new Netskope integration with Chrome, which provides an easy, elegant process right out of the box to get new employees onboarded. At a high level, here’s how this integration works:

The first step is device validation, asking if the user’s device is trustworthy? Whether it’s managed or unmanaged, should this device be allowed to connect to the network? From there, the next step is user validation, understanding who is trying to connect to the network, what their role is, what privileges they should have? What compliance and mandates should be applied? The answers to these questions and more are then taken together enabling verification of the user and device using the Netskope Security Cloud. By learning and verifying the Chrome user’s identity, the Netskope Security Cloud can match the user to the proper policy, which helps to enforce continuous, real-time, context-driven, identity-based zero trust access to critical cloud resources, services, and applications. Netskope works with Verified Access, which enables a web service to request proof that its client is running an unmodified Chrome OS that’s policy-compliant. The setting includes controls to ensure that Chrome OS devices in an organization verify their identity and that they’re running in Verified Boot mode to content providers.

Take control of your security with built-in, intelligent security, granular policy controls, and automatic updates for continuous protection from Chrome OS. Protect users and data against ransomware, malware, and phishing threats with a tamper-proof OS and devices. Each layer of Chrome OS’s vertically integrated stack reinforces security, while system-wide automatic updates future-proofs your protection. 

Couple Google Chrome OS and Chromebook with Netskope’s granular, context-based cloud security controls and you have a solution that is less complex and ready out-of-the-box. Not only that, but this integration can help improve security posture and visibility, helping to drive more transparent policy enforcement without impacting user experience. Improved security and low user friction are what IT professionals strive for every day.  Together the Netskope Security Cloud and Google Chrome are taking an important step to provide that important capability for all Chromebooks.

Click here to learn more about the Netskope integration with Chrome OS and Chromebook. If you’re interested in other Netskope integrations with Google, check out our pages on Netskope for GCP and Netskope for Google Workspace.

author image
About the author
Rolf has over 20 years of experience in Data Networking and Security. Rolf’s experience has been built in pre-dominantly customer-facing engineering roles in both pre-sales and post-sales capacities.
Rolf has over 20 years of experience in Data Networking and Security. Rolf’s experience has been built in pre-dominantly customer-facing engineering roles in both pre-sales and post-sales capacities.