Skip to main content

Hear from our internal security team as they discuss the possible settings and changes which can be made in the Netskope tenant to accommodate a lost/stolen corporate managed device. 

 

Learn how to: 

  • Modify settings in the tenant proactively for lost/stolen device cases in the future
  • Effectively deal with lost/stolen devices by setting up protective measures against device misuse
  • Minimize data loss in case of lost/stolen device cases by blocking data movement from the device

 

 

Check out our blog for more information!

Around 18min into this video when you talk about real-time protections, this is geared toward the user (not the device) correct? How would you overcome a stolen laptop but then a replacement laptop for the same user? The RTR in the video would apply to the users replacement laptop.

 

Edit: I saw this asked in the questions at the end. So this process won’t work for a replacement device. It would be nice to see a feature added that allows further RTR granularity by computer group.


Reply