Flexible deployment options support any use case
Enterprises considering a cloud security platform architected around only one or two deployment options limit their ability to cover all cloud and web traffic and miss key use cases. Netskope offers the industry’s only all-mode architecture that supports any use case. This starts with the option of being deployed 100 percent in the cloud, as an on-premises appliance, or via a hybrid configuration that includes both. Once you choose your deployment method, the next step is to select how you want to steer traffic. Netskope supports every possible out-of-band and inline deployment mode, including forward and reverse proxy, secure TAP, API, and log-based discovery. GRE support is also available for on-premises web traffic. These modes are often used in parallel to cover customers’ multiple use cases.
Netskope supports every possible out-of-band and inline traffic steering option, including forward and reverse proxy, decrypted TAP, API, and log-based discovery. GRE support is available for web traffic from on-premises locations. These modes are often used in parallel to cover customers’ multiple use cases with a single, consistent policy framework.
Deploy as a 100 percent cloud-based service, on-premises, or hybrid. You can also choose an appliance to keep all of your security data on-premises for data residency or compliance purposes. With Netskope, you have total flexibility.
Choose from the broadest variety of forward proxy configurations to gain visibility into web and cloud usage and enforce real-time policy controls over activities and data in any cloud service, sanctioned or unsanctioned, and website.
Use reverse proxy deployment to gain visibility into cloud usage and enforce real-time policy controls over activities and data in sanctioned apps.
Use an out-of-band API connection into your sanctioned cloud services to find sensitive content, enforce policy controls, and stop threats.
Discover cloud services and websites in use in your organization by parsing log data from your existing perimeter security device. You even have the option to tokenize your log data in the cloud for data privacy and residency purposes. Optionally leverage support to connect to a decrypted TAP on your existing proxy to get deeper visibility into activity- and data-level details.
Learn about the top 20 use cases for smart cloud security and what to consider in terms of functional and architectural requirements for each use case.Learn more
We'd love to hear from you!