Skip to content

LogRhythm and Netskope Security Cloud

Netskope Security Cloud

As logs are ingested into the LogRhythm NextGen SIEM Platform, the Netskope SRP uses the Netskope RESTful API to add suspicious URLs, files, and SHA-256 hashes to Netskope’s blacklist. This can be performed from custom AI Engine rule sets or manually from the Web Console. The SRP also stores a local copy in the LogRhythm List Manager. If a threat feed indicates questionable browsing habits in LogRhythm, a security analyst can use the Netskope SRP to add the suspicious URL or file to the LogRhythm List and Netskope’s blacklist.

[pdf-embedder url=”https://advantage.nz/wp-content/uploads/2022/05/Netskope-JSB.pdf” title=”LogRhythm Automates Blacklisting of Suspicious URLs and Files”]

Facebook
Twitter
LinkedIn

Related Posts

Personal data protection is more important than ever in this digital world. The dark web is a secret part of the internet that is very dangerous because it is often used for illegal things like selling personal information.
Every morning, I stand before my coffee machine, a humble supplicant seeking caffeine. Sound familiar? Probably because you find yourself in much the same position (though in your home, not mine). But the coffee machine is wiser than it appears: It doesn’t care that I’ve spent years navigating the wilds of cybersecurity while exploring select espressos from Brazil and beyond.