Skyhigh captures a complete record of all user activity in Dropbox and leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, Skyhigh can detect cross-cloud threats that involve usage in Dropbox and other cloud services. As threats are resolved, Skyhigh automatically incorporates this data into its behavioral models to improve detection accuracy.
Skyhigh audits collaboration activity and visually summarizes all sharing events within the organization, with partners, with personal emails, and via untraceable shared links. Secure Collaboration enforces collaboration policies based on sharing activity and document content and can take action by modifying permissions and revoking links.
“Skyhigh allows us to extend DLP outside the perimeter and into the cloud and the user experience is seamless.”
“In an environment with millions of unique events each day, Skyhigh does a nice job of cutting through the noise and directing us to the areas of greatest security concern.”
“When IT can bring the audit committee and executive members together and they are comfortable using the cloud, it is huge. Skyhigh is mitigating and lowering risk. It's a fact.”
“We’re seeing both costs and risk go down as a result of our work with Skyhigh.”
Skyhigh identifies all file sharing and collaboration solutions that employees use in place of the corporate standard, Dropbox, and provides a risk rating for each service. Using Skyhigh, you can enforce risk-based governance controls and coach users to Dropbox to improve collaboration while also reducing cost and risk.
Identifies any shadow IT cloud services employees are using in place of the corporate standard, Dropbox.
Displays just-in-time coaching messages guiding users from unapproved services to Dropbox and enforces granular policies such as read-only access.
Identifies sensitive data stored at rest in Dropbox with the ability to schedule periodic scans based on date range, user, sharing status, and file size.
Identifies all users and groups accessing Dropbox and reveals which users are accessing sensitive data.
Visually summarizes sharing with third-party business partners, personal emails, and internal users and reports on policy exceptions.
Discovers and groups users from directory services and Dropbox. User groups can be leveraged for analytics and policy enforcement.
Delivers a threat protection dashboard and incident-response workflow for potential insider threats, privileged user threats, and compromised accounts.
Correlates multiple anomalous events within Dropbox or across Dropbox and other cloud services to accurately separate true threats from simple anomalies.
Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.
Analyzes login attempts to identify impossible cross-region access, brute- force attacks, and untrusted locations indicative of compromised accounts.
Identifies excessive user permissions, zombie administrator accounts, inappropriate access to data, and unwarranted escalation of privileges and user provisioning.
Provides an adjustable sensitivity scale for each anomaly type with real-time preview showing the impact of a change on anomalies detected by the system.
Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.
Identifies stolen credentials acquired in phishing attacks and leaked from breached cloud services to reveal users and services at risk.
Enforces DLP policies based on data identifiers, keywords, user groups, and regular expressions with multiple remediation options.
Enforces external sharing policies based on domain whitelist/blacklist and content and educates users on acceptable collaboration policies.
Enforces data loss prevention policies for data stored at rest in Dropbox and data uploaded or shared in real time.
Provides a native cloud DLP engine designed for DLP, resulting in greater accuracy and fewer false positives/negatives than third-party engines built for search.
Provides multiple options including coach user, notify administrator, block, encrypt, quarantine, tombstone, and delete and enables tiered response based on severity.
Offers a unified interface to review DLP violations, take manual action, and rollback an automatic remediation action to restore a file and its permissions.
Displays an excerpt with content that triggered a DLP violation to understand its context. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.
Delivers customizable email notifications to end users in response to policy violations to coach them on appropriate Dropbox usage.
Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.
Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.
Optionally performs a first pass DLP assessment in the cloud before downloading potential violations to an on-premises DLP system for evaluation and reporting.
Provides a streamlined user interface and embedded workflows for four distinct personas: governance, compliance, security, and executive.
Delivers pre-defined roles with granular and customizable permissions to manage the data and product capabilities users can access within Skyhigh.
Collects logs from firewalls, proxies, and SIEMs, integrates with directory services via LDAP, and tokenizes sensitive data before uploading to the cloud.
Leverages an irreversible one-way process to tokenize user identifying information on premises and obfuscate enterprise identity.
Provides script, API, and ICAP-based integration allowing you to enforce access and security policies consistently across your existing firewalls and proxies.
Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, Intel McAfee, and Forcepoint.
Combines Skyhigh anomaly and event data with events from other systems and leverages your existing incident remediation process.
Leverages a complete coverage model including log collection and reverse proxy deployment modes to support all cloud access scenarios.
We deliver the most comprehensive set of CASB functions across all cloud services and access scenarios.
Our customer retention rate is the highest in the industry and the direct result of our obsessive customer focus.
Skyhigh is proven at over 600 enterprises with more than 30 million users, including 40% of the Fortune 500.