01
Gain full visibility
Monitor activity in managed and unmanaged SaaS, IaaS and cloud services and understand what risks they might pose to your organization.
Read more
All-mode architecture
- See traffic from managed or unmanaged cloud services and apps, including details, such as user, device, app, instance, risk, activity, and context
- Gain cloud visibility whether users are on-premise or remote
- Cover browsers, sync clients, and mobile apps
- Offers you an array of deployment options – options include:
- Out-of-band API introspection for selected cloud services, like Office 365 and Salesforce
- Reverse proxy mode covers cloud service access from outside your network and unmanaged devices
- Forward proxy mode covers any cloud service
- Combine different modes to expand your coverage
02
Assess enterprise-readiness of cloud services
Understand the risks different cloud services and apps pose to your organization by measuring both your overall risk, as well as risk by cloud service or user.
Read more
Netskope Cloud Confidence Index (CCI)
- Contains objective criteria adapted from the Cloud Security Alliance
- Measure cloud services’ enterprise-readiness based on 50+ objective attributes by viewing and comparing service attributes in the areas of security, legal, audit and third-party certifications, vulnerabilities and exploits, financial viability, and privacy features
- Customize scores based on your specific requirements and compensating controls
- Incorporate enterprise-readiness scores into your policies, such as “disallow the upload of personally identifiable information (PII) to any cloud storage service rated ‘medium’ or ‘below”
03
Drill into risk details
Get at-a-glance risk metrics, with the ability to drill down into the details to see risky services, users, compromised credentials, anomalies, and threats.
Read more
Risk dashboard
- See overall risks and risks by cloud service, app, and user
- Take advantage of rules and machine learning-based anomaly detection to:
- Understand which users’ account credentials have been compromised in external data breaches
- Be alerted to threats, such as malware and ransomware, as well as anomalies like data exfiltration, bulk downloads, and shared credentials
- Use this information to create and enforce policies to protect your organization
04
Support reporting requirements
Perform ad hoc queries for on-demand analytics and reports or create and use saved queries to generate detailed custom reports for ongoing compliance reporting.
Read more
Dynamic query engine
- Use Netskope’s dynamic query engine that uses natural language input and Boolean operators to mine rich cloud and app usage data
- Answer any cloud and app security question
- Save queries as custom search results
- Build investigation audit trails to know step-by-step cloud and app transactions
- Use context to understand the details surrounding an event