TrustRadius: an HG Insights company
Netskope NextGen SWG Logo

Netskope NextGen SWG Reviews and Ratings

Rating: 8.6 out of 10
Score
8.6 out of 10

Reviews

2 Reviews

Next-Level Data Protection My Experience with Netskope NextGen SWG.

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

We are using Netskope NextGen SWG for data leakage prevention because it has strong DLP (Data Loss Prevention) policy capabilities. We have implemented policies mainly for browsing and downloading activities. When a user needs to upload data to a website, we allow it only based on specific business requirements. This approach helps us reduce the surface area for potential data leakage while still supporting necessary business operations and maintaining compliance.

Pros

  • Granular control on the basis of Activity like browse , download , upload, Post etc.
  • Threat Protection.
  • Content Post control on Gen AI platforms like ChatGPT and Copilot.

Cons

  • Netskope NextGen SWG could improve in DLP enforcement. Sometimes policies don’t apply consistently across certain websites, even when configured.
  • In custom connectors, DLP features are not supported.

Likelihood to Recommend

Netskope makes it easier to manage SaaS apps such as Google Drive, Dropbox, Office 365, and other enterprise applications by allowing different rules for personal and corporate accounts. It provides detailed control over these platforms. For example, in OneDrive, you can set policies so that a user is allowed to share files only with a specific domain or individual, and restrict sharing in the opposite direction as needed.

Vetted Review
Netskope NextGen SWG
2 years of experience

How Recover the control of our newly outside corporate users

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

The main use case of Netskope NextGen SWG in my organization is to can control what are accessed by the company users what work from home or outside of the office using or not corporate devices. With this tool we recover the control about what is accessed in internet include threat protection, SSL decrypt and dlp features.

Pros

  • Control Web Traffic
  • SSL Decrypt
  • Control Web 2.0
  • Threat Protection
  • DLP

Cons

  • Reporting
  • Integration with Azure AD
  • Deploy Procedure

Likelihood to Recommend

Scenarios Well Suited

- Replace On Premises Proxies

- Control Work from Home users

- Data Loss Prevention to data storage in cloud services

- Control could be applied to the most used type of operate systems ( Windows, MAC, IOS adn Android)

Scenarios Less Appropriate

- Shared Devices

- Access to the Internal Applications