Netskope named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Service Edge. Get the Report.

  • Security Service Edge Products

    Protect against advanced and cloud-enabled threats and safeguard data across all vectors.

  • Borderless SD-WAN

    Confidently provide secure, high-performance access to every remote user, device, site, and cloud.

  • Platform

    Unrivaled visibility and real-time data and threat protection on the world's largest security private cloud.

Netskope Named a Leader in the 2022 Gartner Magic Quadrant™ for SSE Report

Get the report Go to Products Overview
Netskope gartner mq 2022 sse leader

Gartner® Quick Answer: How Does Netskope’s Acquisition of Infiot Impact SD-WAN, SASE, and SSE Projects?

Get the report
Quick Answer: How Does Netskope’s Acquisition of Infiot Impact SD-WAN, SASE and SSE Projects?

Netskope delivers a modern cloud security stack, with unified capabilities for data and threat protection, plus secure private access.

Explore our platform
Birds eye view metropolitan city

Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn more
Lighted highway through mountainside switchbacks

Prevent threats that often evade other security solutions using a single-pass SSE framework.

Learn more
Lighting storm over metropolitan area

Zero trust solutions for SSE and SASE deployments

Learn more
Boat driving through open sea

Netskope enables a safe, cloud-smart, and fast journey to adopt cloud services, apps, and public cloud infrastructure.

Learn more
Wind turbines along cliffside
  • Our Customers

    Netskope serves more than 2,000 customers worldwide including more than 25 of the Fortune 100

  • Customer Solutions

    We are here for you and with you every step of the way, ensuring your success with Netskope.

  • Training and Certification

    Netskope training will help you become a cloud security expert.

We help our customers to be Ready for Anything

See our Customers
Woman smiling with glasses looking out window

Netskope’s talented and experienced Professional Services team provides a prescriptive approach to your successful implementation.

Learn more
Netskope Professional Services

Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn more
Group of young professionals working
  • Resources

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog

    Learn how Netskope enables security and networking transformation through security service edge (SSE).

  • Events & Workshops

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

Episode 15: Building Permanent Security Awareness

Play the podcast
Black man sitting in conference meeting

Read the latest on how Netskope can enable the Zero Trust and SASE journey through security service edge (SSE) capabilities.

Read the blog
Sunrise and cloudy sky

SASE Week

Netskope is positioned to help you begin your journey and discover where Security, Networking, and Zero Trust fit in the SASE world.

Learn more
SASE Week

What is Security Service Edge?

Explore the security side of SASE, the future of network and protection in the cloud.

Learn more
Four-way roundabout
  • Company

    We help you stay ahead of cloud, data, and network security challenges.

  • Why Netskope

    Cloud transformation and work from anywhere have changed how security needs to work.

  • Leadership

    Our leadership team is fiercely committed to doing everything it takes to make our customers successful.

  • Partners

    We partner with security leaders to help you secure your journey to the cloud.

Netskope enables the future of work.

Find out more
Curvy road through wooded area

Netskope is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Learn more
Switchback road atop a cliffside

Thinkers, builders, dreamers, innovators. Together, we deliver cutting-edge cloud security solutions to help our customers protect their data and people.

Meet our team
Group of hikers scaling a snowy mountain

Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn more
Group of diverse young professionals smiling

Vulnerability Disclosure Policy

 

Definition

Netskope takes the protection of our customers’ information and the products and services Netskope provides to them very seriously.

 

Netskope wants security researchers to feel comfortable reporting vulnerabilities they’ve discovered, as set out in this policy so that Netskope can remediate them and help us keep Netskope products and information safe.

 

This policy describes what systems and types of research are covered under this policy, how to send us vulnerability reports, and how long Netskope asks security researchers to wait before disclosing any vulnerabilities.

 

 

Compliance

If you comply with this policy during your security research and do not compromise the security of Netskope systems, Netskope’s customers’ data, or the safety or privacy of Netskope users, Netskope will work with you to understand and resolve the issue quickly and will not initiate or recommend legal action related to your research.

 

Netskope will be using your Name and Mail id (if required) while making public disclosures. Due to privacy concerns, If you do not wish to use the same, please notify Netskope in advance.

 

 

Guidelines

Netskope requires you to:

  • Notify Netskope as soon as possible once you discover a real or potential security issue.
  • Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and any access, copying, destruction or manipulation of data.
  • Only use exploits to the extent necessary to confirm a vulnerability. Do not use an exploit to compromise or exfiltrate data, establish command line access and/or persistence, or use the exploit to “pivot” to other systems.
  • Once you’ve established that a vulnerability exists, or encountered any of the sensitive data outlined below, you must stop your test and notify us immediately.
  • Keep confidential any information about discovered vulnerabilities until announced by Netskope. For details, please review the Coordinated Disclosure section.
  • Netskope encourages a coordinated public disclosure of security issues and expects security researchers to provide Netskope a reasonable time to fix the security issue before making any disclosure, public or otherwise.

 

 

Scope

This policy applies to all the products, services and infrastructure developed, managed and maintained by Netskope.

 

Additionally, vulnerabilities found in Netskope service providers’ systems fall outside of this policy’s scope and should be reported directly to the service provider according to their disclosure policy (if any). If you are not sure whether a system or endpoint is in scope or not, contact us at [email protected] before starting your research.

 

A subset of these systems may be eligible for bounties. Check Netskope’s program page on BugCrowd for the current list of bounty-eligible systems.

 

 

Rules of Engagement

The following test types are not authorized:

  • User interface bugs or typos.
  • Engage in Social Engineering.
  • Introducing or adding a malware/malicious software.
  • Network denial of service (DoS or DDoS) tests.
  • Physical testing (e.g., office access, open doors, tailgating), social engineering (e.g., phishing, vishing), or any other non-technical vulnerability testing.

 

If you encounter any of the below on Netskope systems while testing within the scope of this policy, stop your test and notify us immediately:

  • Personal Identifiable Information (PII)
  • Customer Data or Account Credentials
  • Financial information (e.g., credit card or bank account numbers)
  • Proprietary information or trade secrets of companies of any party
  • Denial of Service or situations where the site and application are not responding

 

 

Reporting a Vulnerability

Netskope accepts vulnerability reports via below channels –

  • Through BugCrowd (www.bugcrowd.com). If BugCrowd is not open or available please share any vulnerabilities with [email protected] and Netskope will work to get you recognition via BugCrowd when it becomes available.
  • Directly to Netskope via email using [email protected]

 

Note: Netskope does not support PGP-encrypted emails. For particularly sensitive information,we ask that you submit through the Netskope’s BugCrowd program. Reports may be submitted anonymously.

 

Netskope prefers reports via BugCrowd but will respond to reports through any of the above channels. Note, only the reports submitted via BugCrowd will be eligible for bounties, except in the event that BugCrowd is not open or available, as noted above.

 

Reports should include:

  • Description of the location and potential impact of the vulnerability.
  • A detailed description of the steps required to reproduce the vulnerability. Proof of concept (POC) scripts, screenshots, and screen captures are all helpful. Please use extreme care to properly label and protect any exploit code.
  • Any technical information and related materials Netskope would need to reproduce the issue.
  • Associated CWEs and Risk Rating such as Base CVSS (if applicable).

 

Please keep vulnerability reports current by sending Netskope any new information as it becomes available.

 

Note: Netskope may share your vulnerability reports with US-CERT, as well as any affected vendors or open source projects.

 

 

Coordinated Disclosure

Netskope is committed to patching vulnerabilities in a timely manner based upon the severity of the vulnerability and disclosing the details of those vulnerabilities when patches are published. Netskope knows that public disclosure of vulnerabilities can be an essential part of the vulnerability disclosure process and that one of the best ways to make software better is to enable everyone to learn from each other’s mistakes.

 

At the same time, disclosure in absence of a readily available patch may increase risk rather than reduce it, and so Netskope asks that you refrain from sharing your report with others while Netskope works on a patch. If you
believe there are others that should be informed of your report before the patch is available, please let us know so Netskope may consider other arrangements.

 

Netskope recognizes that self-disclosure of bugs may be of interest to you and does not take issue with this practice. Netskope asks that any self-disclosure publication be coordinated with the release of required patches
and in conjunction with Netskope’s advisory communications efforts. Note that in some cases there may be sensitive information that Netskope will require you to redact, so please review with Netskope before self-disclosing.

 

 

Questions

For any questions on the policy and for further help, please write to us at [email protected].

 

Note: Netskope reserves the right to update the policy at any time.