Skyhigh for Dropbox

Unlock the benefits of cloud-based file sharing and collaboration while meeting data security, compliance, and governance requirements

Enforce data loss prevention policies in Dropbox

Skyhigh enforces DLP polices across data stored in Dropbox to ensure compliance with regulations and internal policies. Skyhigh supports DLP rules based on keywords, data identifiers, user groups, and regular expressions. Enforcement actions include coach users, notify administrator, quarantine, tombstone, and delete. Leverage pre-built industry templates, create custom policies in Skyhigh, or leverage policies in an existing on-premises DLP solution.

Unified DLP reporting and remediation

Skyhigh reports on DLP violations in Dropbox and other cloud services in a unified interface with highlighted excerpts revealing the exact content that triggered the DLP policy. During review, if a file does not violate a policy, the reviewer can rollback the remediation action to restore the file and/or its sharing permissions. Quarantined files are stored in a secure account within Dropbox, not in Skyhigh’s platform, for added security.

Deep integration with on-premises DLP solutions

With Skyhigh you have the option to leverage our best-in-class DLP engine or the policies in your existing on-premises solution such as Symantec DLP, Intel McAfee DLP, Forcepoint DLP, and more. Skyhigh optionally performs a first-pass content inspection, brokers inspection by the on-premises solution, acts as an enforcement point to apply policies to data in the cloud, and registers enforcement in the on-premises solution that maintains the policy.

Download the Datasheet

Download the Skyhigh for Dropbox datasheet for a complete list of product capabilities.

Download Now

Detect internal and external threats

Skyhigh captures a complete record of all user activity in Dropbox and leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, Skyhigh can detect cross-cloud threats that involve usage in Dropbox and other cloud services. As threats are resolved, Skyhigh automatically incorporates this data into its behavioral models to improve detection accuracy.

Insider and privileged user threats

Skyhigh automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat, whether the threat is accidental or malicious. Privileged User Analytics identifies risk from dormant administrator accounts, excessive permissions, and unnecessary escalation of privileges and user provisioning.

Compromised accounts

Skyhigh detects compromised account activity in Dropbox based on brute force login attempts, logins from new and untrusted locations for a user, and consecutive login attempts from two locations in a time period that implies impossible travel, even if the two logins occur across two cloud services. Darknet Intelligence reveals user accounts for sale online that are at risk of compromise.


Analyze sharing and enforce collaboration policies

Skyhigh audits collaboration activity and visually summarizes all sharing events within the organization, with partners, with personal emails, and via untraceable shared links. Secure Collaboration enforces collaboration policies based on sharing activity and document content and can take action by modifying permissions and revoking links.

“Skyhigh allows us to extend DLP outside the perimeter and into the cloud and the user experience is seamless.”

Mike Benson, Chief Information Officer

“In an environment with millions of unique events each day, Skyhigh does a nice job of cutting through the noise and directing us to the areas of greatest security concern.”

Ralph Loura, Chief Information Officer

“When IT can bring the audit committee and executive members together and they are comfortable using the cloud, it is huge. Skyhigh is mitigating and lowering risk. It's a fact.”

Jeff Haskill, Chief Information Security Officer

“We’re seeing both costs and risk go down as a result of our work with Skyhigh.”

Mike Bartholomy, Senior Manager of Information Security

Make Dropbox your corporate standard

Skyhigh identifies all file sharing and collaboration solutions that employees use in place of the corporate standard, Dropbox, and provides a risk rating for each service. Using Skyhigh, you can enforce risk-based governance controls and coach users to Dropbox to improve collaboration while also reducing cost and risk.

Key Features

Governance

Shadow IT Discovery

Discovers all shadow IT cloud services employees are using in place of the corporate standard, Dropbox.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Dropbox and enforces granular policies such as read-only access.

On-Demand Data Scan

Identifies sensitive data stored at rest in Dropbox with the ability to target scans based on date range, user, sharing status, and file size.

Usage Analytics

Identifies all users and groups accessing Dropbox and reveals which users are accessing sensitive data.

Collaboration Analytics

Visually summarizes sharing with third-party business partners, personal emails, and internal users and reports on policy exceptions.

Compliance

Cloud Data Loss Prevention

Enforces policies based on data identifiers, keywords, user, and structured/unstructured fingerprints across data at rest and uploaded or shared in real time.

Secure Collaboration

Enforces external sharing policies based on domain whitelist/blacklist and content and educates users on acceptable collaboration policies.

Multi-Tier Remediation

Provides coach user, notify administrator, block, apply rights management, quarantine, tombstone, and delete options and enables tiered response based on severity.

Structured Data Fingerprinting

Fingerprints billions of unique values stored in enterprise databases and systems of record and supports exact match detection of each value.

Unstructured Data Fingerprinting

Fingerprints sensitive files and detects exact match and partial or derivative matches with a policy-defined threshold for percentage similarity to the original.

Policy Violation Management

Offers a unified interface to review DLP violations, take manual action, and rollback an automatic remediation action to restore a file.

Match Highlighting

Displays an excerpt with content that triggered a DLP violation. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.

Pre-Built DLP Templates

Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.

Closed-Loop Policy Enforcement

Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.

Threat Protection

Dropbox SOC

Delivers a threat dashboard and incident-response workflow for insider threats, privileged user threats, and compromised accounts.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.

Account Compromise Analytics

Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts.

Privileged User Analytics

Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.

Malware Protection

Identifies and blocks known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware.

Guided Learning

Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.

Data Security

Information Rights Management

Applies rights management protection to files uploaded to or downloaded from Dropbox, ensuring sensitive data is protected anywhere.

Platform

Skyhigh Cloud Connector

Connects to cloud services via cloud provider APIs to provide visibility and enforce security and compliance policies for all users and cloud-to-cloud activity.

Skyhigh Enterprise Connector

Facilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.

Integration with On-Premises DLP

Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, Intel McAfee, and Forcepoint.

Integration with SIEMs

Collects log files from SIEMs and provides the ability to report on incidents and events from Skyhigh in SIEM solutions via syslog and API integration.

Integration with IRM

Integrates with leading information rights management systems to enforce existing policies across sensitive data.

Skyhigh is the #1 CASB

http://Skyhigh%20#1%20Wreath
Breadth of Functionality

Only CASB to provide DLP, threat protection, access control, and structured data encryption.

http://Skyhigh%20#1%20Wreath
Breadth of Coverage

Only CASB to cover all users across all devices and support all cloud services, including custom apps on IaaS.

http://Skyhigh%20#1%20Wreath
Platform Scalability

Only CASB that scales to support 2 billion cloud transactions per day at the world's largest global enterprises.

http://Skyhigh%20#1%20Wreath
Platform Security

Only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no customer data in our cloud.