Skyhigh Security Solutions
Skyhigh Cloud Access Security Broker (CASB) discovers all Shadow IT Cloud services in use by employees, both on and off network, including thousands of cloud services, above and beyond what traditional Firewall and Proxy Log analytics are capable of.
Provides pre-built reports and dashboards that summarize cloud usage and risk across multiple dimensions. Security teams can build highly customized reports to highlight the risks of most concern and relevance to the organization, such as which collaboration apps in use are the highest risk, etc.
Allows for the creation of web access policies based on Shadow IT risk assessment, and with the option to apply different restrictions depending on the tenant (e.g., block access to all apps with GDPR high risk).
User activity visibility into all apps supported by Skyhigh Cloud Registry (40K+) with the option to apply granular controls such as allowing sign-in and upload to a group of apps, blocking user downloads.
Delivers the largest and most accurate cloud registry of over 40K+ (Skyhigh Cloud Registry) cloud services based on a detailed security assessment across more than 75 objective criteria. These risk assessments become fundamental building blocks for web and cloud governance policies.
Skyhigh Secure Web Gateway (SWG) connects and secures your workforce, wherever they are, working from the office, working from home or working remotely from another location. Users are protected from malicious websites and risky cloud apps without compromising the user experience.
Delivers zero-day malware protection by integrating remote browser isolation, machine learning, emulation-based sandboxing and real-time global threat intelligence.
Skyhigh Remote Browser Isolation provides a secure way to access new or uncategorized sites, from inside an isolated cloud environment without affecting user experience. For example, teams can grant read only access to recently created web sites.
Blocks user access to websites based on website category, URL or Shadow IT risk assessment.
Inspects all SSL traffic to ensure the complete security, integrity and privacy of encrypted transactions.
90% of an organization’s cloud data resides in their sanctioned cloud apps. Skyhigh CASB protects data and stops threats in the cloud across SaaS, PaaS and IaaS from a single, cloud-native enforcement point. Administrators can monitor user activities in managed corporate cloud apps, while preventing sensitive data from being exposed or exfiltrated.
Provides On-Demand Scan and Near Real-Time scanning on your cloud apps to discover sensitive content and prevent it being shared outside the company. Skyhigh Security provides API CASB for more than 37 cloud services.
Detects compromised accounts or insider threats, using Skyhigh User Entity Behavior Analytics (UEBA), by monitoring anomalies in user behavior and identifying the most risky users, such as a user connecting from an anomalous access location.
The Reverse Proxy deployment mode provides access control for unmanaged devices to sanctioned apps and can be used to prevent users downloading sensitive data to personal devices.
Discover and remediate third-party applications associated with Google Drive and Microsoft 365 connected to your corporate environment via OAuth.
Provides visibility into any possible misconfigurations in your corporate SaaS and IaaS services, giving recommendations on how to remediate them
Skyhigh Security's advanced Data Loss Prevention (DLP) detection capabilities for websites and cloud apps has been matured and battle-tested over the past 15 years. Prevents sensitive information from being sent or shared outside the company.
Delivers robust and advanced detection capabilities to monitor and protect sensitive information from being exfiltrated, such as classification, Optical Character Recognition (OCR), Indexed Document Matching (IDM), Exact Data Matching (EDM).
Provides data protection, natively built into the Skyhigh Cloud Platform, with rich data awareness to cloud and web, robust access policies, and reporting.
Leverages a single set of data classification criteria across multiple, converged technologies to protect your data, wherever it may go. Every DLP incident (web, cloud, and private apps) is located in a single place for better visibility across the organization's data flow.
With each download from the internet, the user waits a certain amount of time between the application sending the initial request, the arrival of the first part of the response, and the completion of the download. This is latency.
Read the ReportResources