Link to home
Create AccountLog in
Security

Security

--

Questions

--

Followers

Top Experts

Avatar of Gautam
Gautam๐Ÿ‡ฎ๐Ÿ‡ณ

allow ChatGPT only for text based use and block file upload

Dear Experts,
All users require access to ChatGPT. As a security practice, is it recommended to allow only text-based use of ChatGPT and block file uploads at the firewall level. please advise.

Zero AI Policy

We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.


ASKER CERTIFIED SOLUTION
Avatar of Adelaido JimenezAdelaido Jimenez๐Ÿ‡บ๐Ÿ‡ธ

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.
Create Account

SOLUTION
Avatar of David Johnson, CDDavid Johnson, CD๐Ÿ‡จ๐Ÿ‡ฆ

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.

SOLUTION
Avatar of Shaun VermaakShaun Vermaak๐Ÿ‡ฆ๐Ÿ‡บ

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.

SOLUTION
Avatar of kevinhsiehkevinhsieh๐Ÿ‡บ๐Ÿ‡ธ

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.

SOLUTION
Avatar of Sajid Shaik MSajid Shaik M๐Ÿ‡ธ๐Ÿ‡ฆ

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.

Avatar of GautamGautam๐Ÿ‡ฎ๐Ÿ‡ณ

ASKER

thank you please suggest DLP software to detect and block uploads/downloads from chat.openai.com.

SOLUTION
Avatar of Shaun VermaakShaun Vermaak๐Ÿ‡ฆ๐Ÿ‡บ

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.

Avatar of GautamGautam๐Ÿ‡ฎ๐Ÿ‡ณ

ASKER

thank you very much, we have two cases as below
case 1 office network : deep inspection of web traffic and setup policies for specific domains like chat.openai.com in the office network
case-2 users working from remote: there are some users who will have data in their laptops and they work from remote
should we have to look for two different DLP solution or all DLP supports this, please advise

SOLUTION
Avatar of kevinhsiehkevinhsieh๐Ÿ‡บ๐Ÿ‡ธ

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.

Avatar of GautamGautam๐Ÿ‡ฎ๐Ÿ‡ณ

ASKER

thanks, how does Netskope or Zscaler ย different ย from gateway level firewall like ย Sophos XG firewall, please advice

Reward 1Reward 2Reward 3Reward 4Reward 5Reward 6

EARN REWARDS FOR ASKING, ANSWERING, AND MORE.

Earn free swag for participating on the platform.


Avatar of kevinhsiehkevinhsieh๐Ÿ‡บ๐Ÿ‡ธ

Netskope and Zscaler can best be though of as proxy servers located on the Internet. Software on each client device talks to the Netskope or Zscaler servers instead of directly to whatever website, such as Google, YouTube, Azure, AWS, etc.

Security

Security

--

Questions

--

Followers

Top Experts

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.