@rclavero @mzhang
@sshiflett @amurugesan @mkoyfman
Hello everyone, good afternoon, excuse me for referencing you but please can you support me with the post please.
I remain attentive to your kind comments
Thank you
Best regards
@MetgatzNK - I spoke to Netskope Technical Account Manager on NPA limitations several times, they confirmed as now NPA does not support SSL Inspection which means it cannot decrypt traffic to perform deep scan so there is no DLP, and Threat Protection applied to private apps. But they also mentioned about a future road map which will support SSL inspection for Private apps.
Thanks
Hello @ark007 thanks for your reply
So the NPA/ZTNA connections to the private apps, does not perform any type of SSL inspection, but for the protocols or connections that are not SSL, for example FTP, SMB, http-tcp:80, among others, does the Threat Protection module not perform any inspection of the traffic in case of any anomaly and/or threat?
So at no point do you perform any type of inspection with the Threat Protection modules? It only protects the endpoint connection, through the Netskope client and the NPA/ZTNA tunnels through the NPA/ZTNA Gateway and the Publishers through the SSL/TLS tunnels, but it does not perform any type of inspection?
Thanks a lot
I look forward to your confirmation and comments.
Best regards
Yes, there is no inspection at all for NPA as of now. But the connection that is stitched to private app via publisher is secure.
Hopefully Netskope will be able to provide that feature soon, lets wait and see 🙂
Thanks