NETSKOPE in Encryption Software

Are you from this Company?
NETSKOPE
2012
$101MN to $500MN
Enterprise
60 Likes
72 Buyers Negotiating

Summary

Netskope offers advanced Cloud Encryption and Key Management solutions which can be integrated with the existing key management solutions.
Features:
- Netskope's Cloud Encryption provides strong encryption by leveraging AES-256
- It encrypts each file with a unique key
- It is highly secure, fault tolerant and Level 3 certified HMS
The Netskope Security Cloud Platform delivers unparalleled visibility and real-time data and threat protection. The platform includes:
- NextGen secure web gateway (SWG) prevents threats, secures data, filters websites, and manages cloud apps in all locations on any device.
- Leading CASB solution which protects cloud applications by offering advanced data protection, threat detection, and adaptive access policy control.
- Public Cloud Security by offering Advanced Cloud Security Posture Management (CSPM) solution that enables users to protect their public clouds with a combination of API and inline protection.

Discussions

Strengths
  • +12
    Professional Services
  • +5
    Consulting Service
  • +14
    Support and Maintenance
  • +6
    Training and education
  • +9
    On-Site Support
  • +10
    Remote Support
  • +9
    AES
  • +10
    IaaS
  • +9
    PaaS
  • +8
    SaaS
  • +7
    Large Enterprises
  • +10
    Cloud
  • +14
    Directly
  • +5
    Through Partners / Third-Party Vendors
  • +12
    Cloud Encryption
  • +13
    Data Encryption
  • +14
    Data Loss Prevention
  • +6
    Key Management
  • +5
    Tokenization
  • +8
    SMEs
Cautions
  • -6
    Application-level encryption
  • -12
    Data-at-rest encryption
  • -5
    File level encryption
  • -13
    Managed Services
  • -10
    Customer Redressal Mechanism/Program
  • -9
    Level of Support
  • -10
    Patented inhouse algorithm
  • -9
    On-Premise
  • -11
    Communication Encryption (Voice email, and message)
  • -10
    Database and Application Encryption
  • -8
    Disk Encryption
  • -9
    File/Folder Encryption
  • -7
    Others
  • -8
    Application-level tokenization
  • -7
    Column-level encryption
  • -11
    Data-in-motion encryption
  • -13
    Data-in- process/use encryption
  • -14
    Virtual machine instance encryption
  • -11
    Others (RSA, Blowfish, DES)
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup