This guide gives a brief description on the functions and features of Netskope.
The following are common questions about Netskope:
Data-Centric - Netskope's data-centric approach to security removes all blind spots and protects data everywhere it goes.
Cloud-Smart - Netskope has an intimate understanding of the cloud to safely enable the cloud and web.
Fast - Netskope runs on one of the world’s largest and fastest security networks.
Netskope Private Access (NPA) is part of the Netskope security cloud and enables zero-trust secure access to private enterprise applications in Hybrid IT. NPA is a modern remote access service that:
For more information, reference What is Netskope Private Access?
Netskope Secure Web Gateway enables administrators to govern web usage and provide a safe experience for users with comprehensive web classification and content filtering.
For more information, reference What is Netskope Secure Web Gateway?
Netskope API Data Protection provides policy and access control, risk-anomaly forensics, and data governance. The following sections walk you through each key benefit of API Data Protection and how to get the most out of your API Data Protection policies. For more information, reference Netskope API Data Protection Overview.
For more information about creating API-enabled protection instances, reference How to Create Netskope API-Enabled Protection Instances.
For information about how to create policies for your newly created API-enabled protection instance, reference How to Configure a Netskope API Data Protection Policy.
Netskope release notes are available through Dell. For more information, reference Netskope Release Notes.
Netskope allows for multiple administrators to help manage the policies, events, and overall health of the environment. Extra roles can be customized to allow for granular role-based access for specific administrative groups. For more information, reference How to Add a Netskope Administrator.
Netskope system requirements vary by operating system. For more information, reference Netskope Client System Requirements.
Netskope Client may be downloaded from the Netskope tenant. For more information, reference How to Download the Netskope Client.
The installation process for Netskope varies by operating system. For more information, reference How to Install Netskope Client.
A Netskope incident is any action that falls outside of normal operations as outlined by a Netskope administrator, either using custom or prebuilt profiles. Netskope breaks these incidents out as data loss prevention (DLP) incidents, anomalies, compromised credentials, or files that have been quarantined or placed in a legal hold status. For more information, reference What Are Netskope Incidents?
Identifying the version varies by operating system platform. For more information, reference How to Identify the Netskope Client Version.
Netskope provides several customizable reports. For information about how to setup and schedule reports, reference How to Setup and Schedule Netskope Reports.
Logs may be uploaded from other devices or services to Netskope for finding gaps of coverage, and shadow IT in use in your organization. For more information, reference How to Upload Logs to the Netskope Cloud.
The log collection process for Netskope varies by operating system. For more information, reference How to Collect Netskope Logs.
The uninstall process for Netskope varies by operating system. For more information, reference How to Uninstall Netskope Client.
Customers who have purchased Netskope through Dell are provided support by Dell ProSupport for Software. For more information, reference Dell Data Security International Support Phone Numbers.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.