Netskope Success Resource Center
Netskope Success Resource Center
This resource center provides use case driven examples and practical application of the Netskope suite of products. This resource is dynamic and updated periodically so check back for updates.
- Vendor Risk Assessment
- Observe Cloud App Activities (OPLP) and Risk Insights
- CASB API Protection
- Cloud Inline Protection
- Unmanaged Device Protection
- IaaS
- SWG Web traffic
- Advanced Threat Protection
Articles
- Vendor Risk Assessment
- Observe Cloud App Activities (OPLP) and Risk Insights
- CASB API Protection
- Understanding API Protection
- API (Observe for Managed App Activities)
- Create a list of publicly accessible documents in an API-Protected service
- Create a list of externally shared documents stored in an API-Protected service
- Create a list of private documents stored in an API-Protected service
- Create a list of executable or other files stored in an API-Protected service
- Create a list of users with most public files stored in an API-protected service
- Create a list of users with non-expiring links to files stored in an API-Protected service
- Create reports on activity or incidents in an API-Protected service
- API (Monitor for Managed App Activities)
- Alert when a file is shared with large number of users (internal/external)
- Alert when a file is shared with specific groups
- Investigate specific external user activity to determine risk posture
- Investigate specific internal user activity to determine risk posture
- Identify and act on individual files or folders on a case by case basis
- Alert when a file is made public
- Alert when a file is externally shared
- API (Protection for Managed App Activities)
- DLP – Protect state for Managed App Activities
- Create a DLP policy to search an entire data repository and apply predefined labels per Enterprise data classification rules
- Create a policy to identify sensitive data in specific locations (public, external or non-approved groups)
- Create a policy to alert or block sharing of sensitive data with external Teams
- Create a policy to find encrypted or password protected files
- Create and apply a legal hold policy if required
- Threat Protection – Protect state for Managed App Activities
- Cloud Inline Protection
- Inline monitoring for Cloud apps
- Apply policies based on AD users, groups, or OU
- Apply policies based on the source of traffic
- Apply policies based on the source of traffic, trusted, or untrusted networks
- Apply policies based on the source of traffic, forward, or reverse proxy
- Apply policies based on the application instance
- Apply policies based on the constraint profile
- Apply policies to enforce step up authentication as required
- Analyze user activity, such as uploads or posts, in cloud apps that create or shares content
- Analyze and report on using corporate credentials on non-sanctioned apps
- Inline protection of Cloud apps
- Allow access to a sanctioned instance of a supported corporate app
- Allow access to a sanctioned application based on app tag
- Block risky activities to Unsanctioned/non-IT purchased apps
- Block risky activities to Low / Poor CCL apps
- Alert/block upon detection of password protected files
- Coach users away from unsanctioned applications and allow justification of required use
- Inline monitoring for Cloud apps
- Unmanaged Device Protection
- IaaS
- SWG Web traffic
- Advanced Threat Protection
- Protect against unknown malicious websites
- Protect against unknown web threats
- Protect against viruses and malicious files
- Protect against network-based attacks
- Protection against Insider threats
- Protect against Unmanaged S3 access
- Shadow IT – Identifying unsanctioned AWS accounts using Skope IT
- Shadow IT – Identifying unsanctioned AWS accounts using Advanced Analytics
- Control AWS apps using Instance IDs