Where are you on your ZTNA Journey
Hi community members! We are curious to hear where everyone is in their ZTNA journey, please fill out this quick survey or post your journey in the comments below. We look forward to hearing from you!
Hi community members! We are curious to hear where everyone is in their ZTNA journey, please fill out this quick survey or post your journey in the comments below. We look forward to hearing from you!
Is there anyone who has success creating dlp rules using the canned identifiers for PHI? I'm struggling to get a basic combination of First Name, Last Name, Medical Condition to match my test file. I can match and have policy hit for individual ident...
We've opened a support ticket as we believe we've found a bug where devices are not honoring the fail close option in the Client Configuration. We have fail closed unchecked, yet we notice almost all our systems in the UI (as well as logs) having fai...
So we have the agent deployed out to our widows and Macs in our environment. We have followed the Best practice guides for bypassing the VPN traffic with Netskope but we are still having issues connecting to the VPN on the Mac's. Anyone else run into...
Having NS Client deployed/installed pre-Big Sur works great. We've even managed to update the install script to grab the local user logged in, append our email domain and auto enroll with iDP. The challenge now is upgrading to Big Sur relies on a use...
API-enabled Protection provides policy and access control, risk anomalies forensics, and data governance. The following sections walk you through each key benefit of API-enabled Protection and how to get the most out of your API-enabled Protection po...
Cisco Meraki is a lower cost cloud managed alternative to the traditional Cisco Network equipment. The solution is quite popular because of its ease of deployment and management and is marketed as a solution which offers SD-WAN capabilities to small ...
Looking to find best practice configurations when Netskope is integrating with 3rd party vpn vendors such as Palo Alto, F5 or Cisco Anyconnect? Check out the following link - https://support.netskope.com/hc/en-us/articles/360023155053
Though we built the Cloud Threat Exchange module of Cloud Exchange originally to facilitate the automated sharing between plugged-in security stack components of customer-specific threat indicators of compromise, including malURL, IP addresses involv...
Interested in identifying to which datacenter you are sending traffic? Make sure you are steering traffic through Netskope's Cloud Platform and open a browser to http://notskope.com.
Many of our customers indicate that the only "essential" integrations are with identity providers, due to the nature of our identity-centric inline policy engine. Is this true for you?
End user Performance monitoring is quickly becoming essential to IT Operations teams. While approaches vary, typical capabilities include information on response time, latency, and availability. Overall, the goal of end user Performance monitoring is...
This 2 minute video walks through a Crowdstrike ZTA Integration. The scripts identified in the video can be downloaded from the attached "zta crowdstrike sensor reading.docx". Credits: Thanks to Dave Toth for the creation of this video Thanks to Rami...
Question: Does Netskope support insert watermark on documents?
Generally speaking, it is best practice to use service accounts when connecting to APIs, as the API would break if specific admin credentials were to be disabled or deleted.
Question: Does Netskope store the entire file in forensics when we receive a DLP violation?
One of the most common cases our support organization receives is related to application certificate errors/breaking when traffic is being steered via Netskope, related to certificate pinning for the application. Below are a few Support kb articles w...
Welcome to the Additional Discussions board! This is a place for us to discuss Advanced Analytics, DLP, Threat Protection, IaaS, and all other things cyber security & networking. Once we have critical mass around a conversation, we can create a new d...