NETSKOPE in Encryption Software

NETSKOPE
Online
2012
$101MN to $500MN
60
Likes
72 Buyers are Negotiating "Group Buyer Deal" for NETSKOPE
Are you from this company?

NETSKOPE USP

Netskope has the ability to act as a key broker between the on-premises KMS and cloud service. The company has the potential to apply strong encryption selectively to the organization's sensitive data across all of their cloud services. Netskope provides the industry’s most well defined cloud DLP that allows businesses to secure their sensitive data wherever it goes. The company also helps businesses to manage the complexity in meeting compliance requirements from GDPR to PCI-DSS without interrupting productivity and cost. Request NETSKOPE Pricing to get more information.

Summary

Netskope offers advanced Cloud Encryption and Key Management solutions which can be integrated with the existing key management solutions.
Features:
- Netskope's Cloud Encryption provides strong encryption by leveraging AES-256
- It encrypts each file with a unique key
- It is highly secure, fault tolerant and Level 3 certified HMS
The Netskope Security Cloud Platform delivers unparalleled visibility and real-time data and threat protection. The platform includes:
- NextGen secure web gateway (SWG) prevents threats, secures data, filters websites, and manages cloud apps in all locations on any device.
- Leading CASB solution which protects cloud applications by offering advanced data protection, threat detection, and adaptive access policy control.
- Public Cloud Security by offering Advanced Cloud Security Posture Management (CSPM) solution that enables users to protect their public clouds with a combination of API and inline protection.

360 Quadrants

Strengths and Weaknesses
  • +12 Professional Services
  • +5 Consulting Service
  • +14 Support and Maintenance
  • +6 Training and education
  • +9 On-Site Support
  • +10 Remote Support
  • +9 AES
  • +10 IaaS
  • +9 PaaS
  • +8 SaaS
  • +7 Large Enterprises
  • +10 Cloud
  • +14 Directly
  • +5 Through Partners / Third-Party Vendors
  • +12 Cloud Encryption
  • +13 Data Encryption
  • +14 Data Loss Prevention
  • +6 Key Management
  • +5 Tokenization
  • +8 SMEs
  • -6 Application-level encryption
  • -12 Data-at-rest encryption
  • -5 File level encryption
  • -13 Managed Services
  • -10 Customer Redressal Mechanism/Program
  • -9 Level of Support
  • -10 Patented inhouse algorithm
  • -9 On-Premise
  • -11 Communication Encryption (Voice email, and message)
  • -10 Database and Application Encryption
  • -8 Disk Encryption
  • -9 File/Folder Encryption
  • -7 Others
  • -8 Application-level tokenization
  • -7 Column-level encryption
  • -11 Data-in-motion encryption
  • -13 Data-in- process/use encryption
  • -14 Virtual machine instance encryption
  • -11 Others (RSA, Blowfish, DES)
Discussions
nodiscussion
There is no interaction
Invite one or more vendors for a discussion.


Top Features

  1. Support and Services / Data Encryption
  2. Support and Services / Data Loss Prevention
  3. Support and Services / Tokenization
  4. Support and Services / Key Management
  5. Deployment Model / SaaS
  6. Deployment Model / PaaS
  7. Deployment Model / IaaS
  8. Applications Catered / Data-at-rest encryption
  9. Applications Catered / File level encryption
  10. Solutions Offered / Cloud Encryption