{"id":5948,"date":"2021-01-28T19:28:16","date_gmt":"2021-01-29T03:28:16","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5948"},"modified":"2021-01-28T19:28:16","modified_gmt":"2021-01-29T03:28:16","slug":"bloxone-threat-defense-client-and-netskope-client-coexistence-blog","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/","title":{"rendered":"BloxOne Threat Defense Client and Netskope Client Coexistence Blog"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">You are planning on using Netskope client to protect your users when accessing cloud resources.\u00a0 What about the resources that Netskope does not protect?\u00a0 This is where BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> Threat Defense Endpoint comes into play.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> Threat Defense (B1TD)<\/span><span style=\"font-weight: 400;\"> Endpoint is a lightweight mobile agent that redirects DNS traffic from your remote devices to the BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> Threat Defense Cloud. It allows you to apply applicable security policies to your roaming end users in remote sites and branch offices. Any DNS resolution that does not point to Netskope controlled resources would be handled by the B1TD endpoint.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The use cases for Netskope are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CASB ( cloud access security brokers)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SWG (secure web gateway)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Private Access<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public Cloud Security<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Netskope is used to steer traffic to and from all relevant cloud storage applications like Google drive.\u00a0 The Netskope client:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enables security teams to identify and prevent exfiltration of sensitive data in the cloud applications.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Allows visibility into SaaS application usage.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Addresses risks associated with common data exfiltration method (ie uploads to cloud storage).<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">\u00a0<\/span><b>Instructions for installing BloxOne<\/b><span style=\"font-weight: 400;\">TM<\/span><b> Threat Defense Client<\/b><\/h3>\n<ol>\n<li><span style=\"font-weight: 400;\">Log into <\/span><a href=\"about:blank\"><span style=\"font-weight: 400;\">www.csp.infoblox.com.<\/span><\/a><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5949\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Netscope-1.png\" alt=\"\" width=\"1600\" height=\"567\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-1.png 1600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-1-300x106.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-1-1024x363.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-1-768x272.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-1-1536x544.png 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0 \u00a02. Navigate to Administration \u2192 Downloads. <\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5950\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Netscope-2.png\" alt=\"\" width=\"1600\" height=\"716\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-2.png 1600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-2-300x134.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-2-1024x458.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-2-768x344.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Netscope-2-1536x687.png 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0 3. In the Endpoint section, click on the appropriate button to download the compressed file for the endpoint client.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0 4. Extract the ZIP file to the folder that you created earlier, and then properly extract the ZIP file.<\/span><\/p>\n<p><b>NOTE<\/b><span style=\"font-weight: 400;\">: Ensure that you extract all the files from the ZIP archive before starting the installation process. Otherwise, the installation might fail if there are any missing files. Go to the folder that contains all the extracted files and click the <\/span><i><span style=\"font-weight: 400;\">ActiveTrustEndpoint.pkg<\/span><\/i><span style=\"font-weight: 400;\"> file if you are an Apple Mac user, or click the <\/span><i><span style=\"font-weight: 400;\">ActiveTrustEndpoint.msi<\/span><\/i><span style=\"font-weight: 400;\"> file if you are a Microsoft Windows user.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0 5. The <\/span><i><span style=\"font-weight: 400;\">BloxOne<\/span><\/i><span style=\"font-weight: 400;\">TM<\/span><i><span style=\"font-weight: 400;\"> Endpoint Setup Wizard<\/span><\/i><span style=\"font-weight: 400;\"> appears when you run the installer program. Click <\/span><b>Next<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0 6. Enter the destination folder in which you want to save the BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> Endpoint application. Click <\/span><b>Next<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0 7. Click <\/span><b>Install<\/b><span style=\"font-weight: 400;\"> in the wizard to install BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> Endpoint.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0 8. Click <\/span><b>Finish<\/b><span style=\"font-weight: 400;\"> when the installation completes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After the endpoint software is installed, the successful status will show up as one of the following:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5951 alignleft\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Netscope-3.png\" alt=\"\" width=\"40\" height=\"30\" \/><\/p>\n<p><span style=\"font-weight: 400;\"><b>Protected<\/b><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Endpoint is running properly, and your device is fully protected against malicious attacks by Infoblox\u00ae Endpoint.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This icon is displayed for the following states:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2013 DNS queries are encrypted and are being sent to the BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> DNS Server.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2013 DNS queries are being sent to the BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> DNS Server.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5952 alignleft\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/Netscope-4.png\" alt=\"\" width=\"57\" height=\"39\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><b>Protected<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If your device is connected to the corporate network, it is protected against malicious attacks by the corporate network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This icon is displayed for the following states:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2013 When the endpoint is connected to the corporate network, the DNS queries are being sent to the corporate DNS servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2013 If you have configured an on-prem DNS forwarding proxy, the DNS queries are being sent to the proxy<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data Flow:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">From the Netskope Administrative Console, cloud applications are selected for protection by the Netskope administrator.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">This configuration information is pushed down to the Netskope client.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When the user makes a request to a resource from the browser, the Netskope client examines the request to determine if it will handle the request.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Otherwise, the DNS request will be handled by the BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> Threat Defense client.\u00a0 Therefore, your users will be protected by BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> Threat Defense Cloud.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">BloxOne<\/span><span style=\"font-weight: 400;\">TM<\/span><span style=\"font-weight: 400;\"> Threat Defense capabilities:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure existing networks and digital transformations like SD-WAN, IoT and cloud leveraging existing infrastructure<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prevent data exfiltration techniques with analytics and machine learning including DNS-based data exfiltration, DGA, DNSMessenger, and fast-flux attacks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detect and block exploits, phishing, ransomware and other modern malware<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identify malware propagation and lateral movement through east-west traffic monitoring<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Restrict user access to certain web content categories and track activity<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect your brand with Lookalike Domain Monitoring for your most valuable internet properties<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reduce response times through automated blocking and sharing of incident details <\/span>to 3<span>rd\u00a0 <\/span><span>party ecosystem solutions through public APIs or on-premises integrations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Accelerate investigations 3X and streamline threat hunting<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enhance visibility: Get precise visibility and rich network context including IPAM <\/span><span style=\"font-weight: 400;\">and asset metadata about your network devices for better correlation of events<\/span><span style=\"font-weight: 400;\">Control the risks of rising DoH use: block DoH (DNS over HTTPS) domain access and gracefully revert DoH requests to existing,trusted DNS<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You are planning on using Netskope client to protect your users when accessing cloud resources.\u00a0 What about the resources that Netskope does not protect?\u00a0 This is where BloxOneTM Threat Defense Endpoint comes into play. The BloxOneTM Threat Defense (B1TD) Endpoint is a lightweight mobile agent that redirects DNS traffic from your remote devices to the [&hellip;]<\/p>\n","protected":false},"author":279,"featured_media":4882,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[428,228,429,430,431,432],"class_list":{"0":"post-5948","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-netscope","9":"tag-bloxone-threat-defense","10":"tag-casb","11":"tag-swg","12":"tag-private-access","13":"tag-public-cloud-security","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>BloxOne Threat Defense Client and Netskope Client Coexistence Blog<\/title>\n<meta name=\"description\" content=\"BloxOne Threat Defense Client and Netskope Client Coexistence Blog. You are planning on using Netskope client to protect your users when accessing cloud resources. What about the resources that Netskope does not protect? This is where BloxOneTM Threat Defense Endpoint comes into play.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BloxOne Threat Defense Client and Netskope Client Coexistence Blog\" \/>\n<meta property=\"og:description\" content=\"BloxOne Threat Defense Client and Netskope Client Coexistence Blog. You are planning on using Netskope client to protect your users when accessing cloud resources. What about the resources that Netskope does not protect? This is where BloxOneTM Threat Defense Endpoint comes into play.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-29T03:28:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"383\" \/>\n\t<meta property=\"og:image:height\" content=\"254\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thomas Lee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Lee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/\"},\"author\":{\"name\":\"Thomas Lee\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/09eef104302d85b2c7d7ce4bec738761\"},\"headline\":\"BloxOne Threat Defense Client and Netskope Client Coexistence Blog\",\"datePublished\":\"2021-01-29T03:28:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/\"},\"wordCount\":721,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"keywords\":[\"netscope\",\"BloxOne\u00ae Threat Defense\",\"CASB\",\"SWG\",\"Private Access\",\"Public Cloud Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/\",\"name\":\"BloxOne Threat Defense Client and Netskope Client Coexistence Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"datePublished\":\"2021-01-29T03:28:16+00:00\",\"description\":\"BloxOne Threat Defense Client and Netskope Client Coexistence Blog. You are planning on using Netskope client to protect your users when accessing cloud resources. What about the resources that Netskope does not protect? This is where BloxOneTM Threat Defense Endpoint comes into play.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg\",\"width\":383,\"height\":254},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BloxOne Threat Defense Client and Netskope Client Coexistence Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/09eef104302d85b2c7d7ce4bec738761\",\"name\":\"Thomas Lee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_279_1571768676-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_279_1571768676-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_279_1571768676-96x96.jpg\",\"caption\":\"Thomas Lee\"},\"description\":\"Thomas Lee is a Technical Marketing Engineer at Infoblox. He has been with Infoblox for over 7 years. He works on the NIOS platform and does competitive analysis. He holds a Computer Science degree from California State University East Bay.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/thomas-lee\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"BloxOne Threat Defense Client and Netskope Client Coexistence Blog","description":"BloxOne Threat Defense Client and Netskope Client Coexistence Blog. You are planning on using Netskope client to protect your users when accessing cloud resources. What about the resources that Netskope does not protect? This is where BloxOneTM Threat Defense Endpoint comes into play.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/","og_locale":"en_US","og_type":"article","og_title":"BloxOne Threat Defense Client and Netskope Client Coexistence Blog","og_description":"BloxOne Threat Defense Client and Netskope Client Coexistence Blog. You are planning on using Netskope client to protect your users when accessing cloud resources. What about the resources that Netskope does not protect? This is where BloxOneTM Threat Defense Endpoint comes into play.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/","og_site_name":"Infoblox Blog","article_published_time":"2021-01-29T03:28:16+00:00","og_image":[{"width":383,"height":254,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","type":"image\/jpeg"}],"author":"Thomas Lee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thomas Lee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/"},"author":{"name":"Thomas Lee","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/09eef104302d85b2c7d7ce4bec738761"},"headline":"BloxOne Threat Defense Client and Netskope Client Coexistence Blog","datePublished":"2021-01-29T03:28:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/"},"wordCount":721,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","keywords":["netscope","BloxOne\u00ae Threat Defense","CASB","SWG","Private Access","Public Cloud Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/","url":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/","name":"BloxOne Threat Defense Client and Netskope Client Coexistence Blog","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","datePublished":"2021-01-29T03:28:16+00:00","description":"BloxOne Threat Defense Client and Netskope Client Coexistence Blog. You are planning on using Netskope client to protect your users when accessing cloud resources. What about the resources that Netskope does not protect? This is where BloxOneTM Threat Defense Endpoint comes into play.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-higher-ed-optimize-automate-cybersecurity.jpg","width":383,"height":254},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-client-and-netskope-client-coexistence-blog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"BloxOne Threat Defense Client and Netskope Client Coexistence Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/09eef104302d85b2c7d7ce4bec738761","name":"Thomas Lee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_279_1571768676-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_279_1571768676-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_279_1571768676-96x96.jpg","caption":"Thomas Lee"},"description":"Thomas Lee is a Technical Marketing Engineer at Infoblox. He has been with Infoblox for over 7 years. He works on the NIOS platform and does competitive analysis. He holds a Computer Science degree from California State University East Bay.","url":"https:\/\/www.infoblox.com\/blog\/author\/thomas-lee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/279"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5948"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5948\/revisions"}],"predecessor-version":[{"id":5955,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5948\/revisions\/5955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4882"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}