I'm with you on that. Although, I do wonder if option D might be a bit too passive. Actively reviewing the logs (E) and using the proxy (C) seem like they'd give you a more proactive approach to finding those hidden cloud apps.
Absolutely, using forward proxy steering methods (C) to direct cloud traffic to Netskope, viewing the 'All Apps' in the Cloud Confidence Index (D), and uploading firewall or proxy logs directly into the Netskope platform (E) seem like the most comprehensive ways to discover new cloud apps. That's a solid set of options.
I agree, and based on the options provided, I think the best choices are C, D, and E. Setting up API-enabled Protection instances (A) seems like it would only cover known SaaS apps, and deploying an On-Premises Log Parser (B) might not give you visibility into all the cloud apps being used.
This is an interesting question. I think the key here is to discover new cloud applications being used within the organization, which is an important task for security and compliance.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Lai
7 months agoGlendora
7 months agoJaime
7 months agoMaile
7 months agoLeslie
7 months agoCruz
7 months agoJusta
7 months agoOzell
7 months agoRoosevelt
7 months ago