Ask the community

Inside Netskope Security

By: Netskope
Empowering Security Awareness: Leveraging Netskope Advanced Analytics Real-Time Coaching

In today’s rapidly evolving threat landscape, user awareness plays a pivotal role in safeguarding organizations against cyber risks. Employees and end read more..

By: Netskope
Sharing Indicators of Compromise (IoC) with Netskope’s Cloud Threat Exchange (CTE)

“You can’t defend against threats that you are not aware of” What is IoC and Why share it? IoC stands for Indicators of Compromise and as the name s read more..

By: Netskope
Automating URL List Management for Remote Browser Isolation (RBI)

Welcome to a project aimed at enhancing the ease of an analyst's experience. In this venture, I've taken automation to the forefront by simplifying ho read more..

By: Netskope
Security posture for Github application at Netskope

GitHub is a web-based platform that provides hosting for software development projects utilizing the Git version control system. It serves as a collab read more..

By: Netskope
Onboarding Multiple Subscriptions for Azure CSPM

What is CSPM and Why CSPM? CSPM stands for Cloud Security Posture Management, it is a process to monitor cloud resources that belong to an organizati read more..

By: Moderator
Netskope & Okta Can Help With Tracking Compliance Training

Security awareness compliance training refers to a specific training initiative created to educate employees, contractors, and other involved parties read more..

By: Netskope
Remote Browser Isolation on Demand for the SOC

As a company, we have deployed and continue to utilize Remote Browser Isolation to browse unknown or questionable sites based on web categories in a ‘ read more..

By: Netskope
Endpoint DLP - Netskope Customer Zero Best Practices

Netskope Endpoint Data Loss Prevention (Endpoint DLP) provides data protection at the endpoint by utilizing Netskopecloud DLP capabilities. You can us read more..

By: Netskope
Real-time Policy Recommendations

Steer It And You Can See It It goes without saying that if you cannot see data exfiltration then you cannot stop it from happening. CASB applications read more..

By: Netskope
Google Workspace RProxy as a Service

Welcome to the world of Reverse Proxy! Today, I will be your guide on creating a Reverse Proxy as a Service (RPaaS) in Google Workspace. We’ll then ap read more..

Inside Netskope Security

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data.

In order to view this content, you will need to sign in to your account. Simply click the "Sign In" button below

Sign In