Skyhigh is Enterprise Grade

We Take Security Seriously

A cloud security solution is a critical component of your IT infrastructure. It controls how employees, contractors, partners and customers gain access to cloud services.

Skyhigh is designed from the ground up to help you meet your security and compliance needs and also be the enterprise grade service you can trust.

Skyhigh has invested heavily to provide an enterprise grade service. Those investments include:

  • Transparency of controls and compliance
  • Operations and DataSecurity expertise & oversight
  • Independent Penetration & vulnerability testing

1. Transparency of controls and compliance

Skyhigh Networks has been awarded the TRUSTe Privacy Seal signifying that our privacy policy and practices meet their TRUSTed Cloud Program Requirements, and compliance certification for EU Safe Harbor requirements. Our controls have also been submitted for inclusion in the Cloud Security Alliance Security, Trust and Assurance Registry.

We Self-Certify Compliance with:

2. Operations and Data

Skyhigh Networks Operations partners with trusted industry leaders like Equinix and XO communications to provide a secure, performant, highly available infrastructure. Access to infrastructure is closely controlled and limited to trusted senior team members. Two-factor authentication and IPSec VPNs ensure strong authentication and encryption of data.

3. Security expertise & oversight

Our service was built by a team with a proven track record in enterprise security. Prior to founding Skyhigh Networks, the team was responsible at Cisco for products that enable customers to administer, enforce, and audit standards-based, consistent access policies across the IT stack. The team delivered the Identity Services Engine, a product that won the coveted Pioneer Award in Cisco and is considered to be a game changer for Cisco.

4. Independent Penetration & vulnerability testing

While we audit ourselves continually, we remember Richard Feynman’s principle: “you must not fool yourself, and you are the easiest person to fool.” Accordingly, major software releases are heavily audited by a 3rd party (Data Theorem), at least twice a year.

END: SeeVolution