Insider risk teams face many challenges, but a common challenge I hear about is this: How can you enforce your acceptable use policies when you have a mix of managed and unmanaged/BYOD devices for the same employees? What if you could leverage the integration with a Cloud Access Security Broker (CASB) to not only provide more context, but to provide enforcement?
The integration between DTEX and Netskope provides an excellent opportunity for partners to help customers extend and mature their zero trust strategies.
Today most of these solutions are managed separately or simply correlated within a SIEM. Unfortunately developing rule sets can be extremely difficult, hard to manage, and generate a lot of false positives. DTEX has more than 200 high fidelity behaviors built into the InTERCEPT platform – out of the box. Partners can help their customers choose the behaviors that are important to them, modify them, or create custom ones if necessary. This significantly improves the time to value for the customer.
DTEX InTERCEPT can also integrate with the Netskope products using Netskope APIs for additional visibility as well as zero-trust enforcement. Audit logs pertaining to user activities on SaaS applications from Netskope will provide visibility into those user actions from both managed and unmanaged endpoints into DTEX InTERCEPT. Suspicious access to sensitive information in a SaaS portal from a BYOD device (i.e. a device that does not have the DTEX forwarder installed) can be correlated with other actions from the user.
DTEX InTERCEPT then provides a risk score for every individual which can be used to make zero-trust decisions and enable access restrictions and related enforcements that are possible via the Netskope platform.
This will also drive professional services. Helping the customer outline the policies and enforcements will take some time, but the investment is well worth it. Be sure to contact us to learn more about the DTEX and Netskope opportunity.