Data Security for the Cloud Era
Skyhigh Security Cloud™ protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It’s cloud-native data security.
Gain complete visibility into data, context, and user behavior across all cloud services, users, and devices.
Take real-time action deep within cloud services to correct policy violations and stop security threats.
Apply persistent protection to sensitive information wherever it goes inside or outside the cloud.
Take a Product Tour
Enforce data loss prevention (DLP) policies across data in the cloud
Skyhigh’s content engine automatically classifies sensitive information. Next, Skyhigh enforces controls to remove or quarantine sensitive data in the cloud and prevent data loss via cloud-based email and messaging.
Prevent unauthorized sharing of sensitive data to the wrong people
Skyhigh’s context engine detects granular file and folder permissions, including all owners, editors, and viewers. The solution enforces collaboration policies in real time by downgrading permissions, removing permissions, and revoking links.
Understand cloud services in use and their risk profile
Skyhigh summarizes cloud usage including cloud services in use by user, along with the risk profile of those services with a 1-10 CloudTrust Rating. Leverage the largest and most accurate cloud registry to enforce risk-based policies.
Block sync/download of corporate data to personal devices
Skyhigh understands access context including device operating system, device management status, and location. Enforce access policies that prevent the download of sensitive data from corporate cloud services to untrusted devices.
Detect compromised accounts, insider threats, and malware
Skyhigh leverages machine learning to build behavior models that detect active account compromise and insider threats. The solution also leverages signatures and sandboxing to identify malware in the cloud and stop threats.
Encrypt cloud data with keys that only you can access
Skyhigh enables you to encrypt your sensitive data in the cloud using encryption keys you control, so no third parties, not even the cloud provider, can access your data. Protect your data while preserving functions such as search.
Audit and tighten the security settings of cloud services
Skyhigh automatically audits the security configuration of cloud services and suggests modifications to improve your security posture based on industry best practices. You can also audit user permissions and tighten excessive permissions.
“With Skyhigh, we can enforce security policies like data loss prevention (DLP), rights management, data classification, threat protection and encryption through a single security platform designed in the cloud, for the cloud.”
“Skyhigh allows us to extend DLP outside the perimeter and into the cloud and the user experience is seamless.”
“Skyhigh helps us understand how employees use Salesforce to identify insider threats, compromised credentials, and excessive privileged user access.”
“We now have the visibility and control we need to be able to allow access to the cloud-based tools our employees need to be competitive and efficient, without compromising our security standards.”
“In an environment with millions of unique events each day, Skyhigh does a nice job of cutting through the noise and directing us to the areas of greatest security concern.”
Unified Policy Engine
Applies unified policies to all cloud services across data at rest and in transit. Leverage policy templates, import policies from existing solutions, or create new ones.
Policy Creation Wizard
Define customized policies using rules connected by Boolean logic, exceptions, and multi-tier remediation based on incident severity.
Pre-Built Policy Templates
Delivers out-of-the-box policy templates based on business requirement, compliance regulation, industry, cloud service, and third-party benchmark.
Provides the world’s largest and most accurate registry of cloud services with a 1-10 CloudTrust Rating based on a 261-point risk assessment.
Leverages an irreversible one-way process to tokenize user identifying information on premises and obfuscate enterprise identity.
AI-Driven Activity Mapper
Leverages artificial intelligence to understand apps and map user actions to a uniform set of activities, enabling standardized monitoring and controls across apps.
User Behavior Analytics
Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of user threats.
Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.
Leverages keywords, pre-defined alphanumeric patterns, regular expressions, file metadata, document fingerprints, and database fingerprints to identify sensitive data.
Detects granular viewer, editor, and owner permissions on files and folders shared to individual users, everyone in the organization, or anyone with a link.
Understands access context including device operating system, device management status, location, and corporate/personal accounts.
Security Configuration Audit
Discovers current cloud application or infrastructure security settings and suggests modifications to improve security based on industry best practices.
Cloud Usage Analytics
Summarizes cloud usage including cloud services in use by a user, data volumes, upload count, access count, and allowed/denied activity over time.
Cloud Activity Monitoring
Captures a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.
Account Compromise Detection
Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts.
Insider Threat Detection
Leverages machine learning to detect activity signaling negligent and malicious behavior including insiders stealing sensitive data.
Privileged User Analytics
Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.
Identifies known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware.
Define policies with multiple levels of severity and enforce distinct response actions based on the severity level of the incident.
Isolate files that trigger policies in a secure administrative location within the cloud service where it was found. Skyhigh never stores quarantined files.
Permanently removes data from cloud services that violate policy to comply with compliance regulations and neutralize malware.
Downgrades file and folder permissions for specified users to editor or viewer, removes permissions, and revokes shared links.
Contextual Access Control
Enforces coarse allow/block access based on service-level risk and granular activity-level controls to prevent upload and download of data.
Forces additional authentication steps in real-time via integration with identity management solutions based on access control policies.
Coaches users to correct policy incidents, and once corrected, automatically resolves incident alerts to reduce manual review of incidents.
Coaches users in real time within the native email, messaging, and collaboration application where the incident occurred.
Policy Incident Management
Offers a unified interface to review incidents, take manual action, and rollback an automatic remediation action to restore a file and its permissions.
Displays an excerpt with content that triggered a policy incident. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.
Structured Data Encryption
Protects sensitive structured data with peer-reviewed, function-preserving encryption schemes using enterprise-controlled keys
Identifies and encrypts existing data found in cloud services and transparently encrypts new data uploaded to the cloud in real time.
Encryption Key Brokering
Integrates with enterprise key management solutions to broker the management and rotation of enterprise encryption keys
Preservation of Application Functionality
Preserves end-user functions such as search, sort, and format using academia and peer-reviewed encryption schemes.
Replaces sensitive data with a token that cannot be reversed to the original clear text value, meeting strict data residency requirements.
Information Rights Management
Applies rights management protection to files uploaded to or downloaded from cloud services, ensuring sensitive data is protected anywhere.