Overview
Netskope Private Access (NPA) provides zero trust network access (ZTNA) to private applications and data in hybrid IT (public cloud and data center) environments. An integral capability of Netskope Intelligent SSE, NPA offers seamless connectivity for authenticated users, supports any application and protocol, reduces business risk, and simplifies IT infrastructure. This listing is for the NPA Publisher AMI that enables NPA to discover resources that remote users require secure access to including AES Marketplaces.
Notes: Download the NPA Publisher AMI only if you have an NPA license.
To test drive NPA, please visit: https://www.netskope.com/lp-npa-trial?utm_source=AWS
Download the NPA Publisher Terraform module here: https://registry.terraform.io/modules/netskopeoss/publisher-aws/netskope/latest
To learn more about NPA automation and the terraform module please read the blog: https://community.netskope.com/t5/Blogs/Managing-Netskope-Publishers-in-AWS-using-Terraform/ba-p/1415
Highlights
- Seamless and direct access to AWS: Connect remote users directly to applications in public cloud environments - no need to hairpin through corporate infrastructure.
- Zero trust network access to private applications: Protect data and resources with application-level access control based on user identity and device security posture.
- Streamlined cloud operations through automation: A modern alternative to legacy VPNs, NPA delivers direct connectivity that is secure, flexible, and highly scalable. NPA supports automation tools such as Terraform modules for automating the deployment, configuration, and scaling of NPA Publishers running in EC2.
Details
Typical total price
$0.042/hour
Features and programs
Financing for AWS Marketplace purchases
Pricing
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
t2.nano | $0.00 | $0.006 | $0.006 |
t2.micro AWS Free Tier | $0.00 | $0.012 | $0.012 |
t2.small | $0.00 | $0.023 | $0.023 |
t2.medium | $0.00 | $0.046 | $0.046 |
t2.large | $0.00 | $0.093 | $0.093 |
t2.xlarge | $0.00 | $0.186 | $0.186 |
t2.2xlarge | $0.00 | $0.371 | $0.371 |
t3.nano | $0.00 | $0.005 | $0.005 |
t3.micro AWS Free Tier | $0.00 | $0.01 | $0.01 |
t3.small | $0.00 | $0.021 | $0.021 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
no refunds
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
NPA Publisher 122.0.0.9124
Additional details
Usage instructions
Resources
Support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Good Solution for Content Filtering Proxy and DLP
Behaviour Analytics is helpful to get alerts for unusual behaviour.
Helping ton solve problem of unwanted data exfiltration of confidential data.
Good Solution for Content Filtering Proxy and DLP
Behaviour Analytics is helpful to get alerts for unusual behaviour.
Helping ton solve problem of unwanted data exfiltration of confidential data.
Netskope Cloud Security
It is most commonly used by multiple customers and in very ease of uses.
Netskope Cloud Security
It is most commonly used by multiple customers and in very ease of uses.
Empowering Digital Transformation with Netskope One
"Netskope One Platform addresses the challenge of managing multiple security solutions by providing a unified approach. This integration simplifies our security management and reduces the complexity of having disparate systems, which ultimately enhances our overall security posture."