Skyhigh for Google Drive

Empower your employees with anywhere access to collaboration while enforcing security and compliance policies

Enforce data loss prevention to comply with external regulations and internal policies

Ensure compliance with regulations such as PCI DSS, HIPAA-HITECH, GLBA, SOX, CIPA, FISMA, and FERPA by applying comprehensive data loss prevention capabilities to new or existing content within Google Drive.

Enforce comprehensive DLP policies

Skyhigh protects data by enforcing granular DLP policies based on keywords, regular expressions, file characteristics, and user activity. Leverage pre-built, vertical-specific templates or extend existing policies defined within on-premise DLP systems.

Deploy flexible, closed-loop workflows

Enforce a broad range of actions including alerting, blocking, tombstoning, and quarantining. Closed-loop remediation with on-premise DLP systems from Symantec, EMC RSA, Intel McAfee, and Websense enables you to utilize existing workflows.

Download the Datasheet

Download the Skyhigh for Google Drive datasheet for a complete list of product capabilities.

Download Now

Standardize on Google Drive

Reduce the cost and risk of cloud storage while improving collaboration and productivity by standardizing on Google Drive. With Skyhigh’s discovery of all shadow IT cloud storage in use and their associated risk ratings, you can educate users on the perils of redundant, high risk services in real-time and guide them to use Google Drive.


Your Google Drive security operations center

Manage Google Drive security from a unified dashboard and protect data from compromised accounts and insider threats. Feed all incidents into your existing SIEMs for consistent reporting and remediation.

Powered by machine learning

Monitor usage and leverage big data analytics to identify compromised account or insider threat security risks stemming from inappropriate privileged access, cross-region access, excessive access, and data exfiltration.

Visibility into the entire G-Drive environment

Track all user and admin activities including uploads, downloads, views, edits, and deletes for compliance and investigations. Understand how content flows externally with analysis of shared links and external collaborations.

“Skyhigh allows us to have more control over data security by adding an additional layer of protection beyond the typical cloud service provider can offer.”

Jenai Marinkovic, Chief Security Officer

“In an environment with millions of unique events each day, Skyhigh does a nice job of cutting through the noise and directing us to the areas of greatest security concern.”

Ralph Loura, Chief Information Officer

“We’re seeing both costs and risk go down as a result of our work with Skyhigh.”

Mike Bartholomy, Senior Manager of Information Security

“When IT can bring the audit committee and executive members together and they are comfortable using the cloud, it is huge. Skyhigh is mitigating and lowering risk. It's a fact.”

Jeff Haskill, Chief Information Security Officer

“With Skyhigh we were able to implement cloud security policies without impacting business user productivity.”

Brian Lillie, Chief Information Officer

Seamless integration with the Google Drive ecosystem

Preserve all application functionality and ensure consistent enforcement of policies across all devices and browser, mobile, and sync clients and SSO services such as Okta, OneLogin, and Ping Identify.

More than Google Drive

Skyhigh Cloud Access Security Broker (CASB) helps more than 600 enterprises enforce their security, compliance, and governance policies for over 20,000+ cloud services, including Salesforce, ServiceNow, Box, Office 365, Google Drive, Dropbox and many more.

Key Features

Governance

Shadow IT Discovery

Discovers all shadow IT cloud services employees are using in place of the corporate standard, Google Drive.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Google Drive and enforces granular policies such as read-only access.

On-Demand Data Scan

Identifies sensitive data stored at rest in Google Drive with the ability to target scans based on date range, user, sharing status, and file size.

Usage Analytics

Identifies all users and groups accessing Google Drive and reveals which users are accessing sensitive data.

Collaboration Analytics

Visually summarizes sharing with third-party business partners, personal emails, and internal users and reports on policy violations.

Compliance

Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, and structured/unstructured fingerprints across data at rest and uploaded or shared in real time.

Secure Collaboration

Enforces external sharing policies based on domain whitelist/blacklist and content and educates users on acceptable collaboration policies.

Multi-Tier Remediation

Provides coach user, notify administrator, block, apply rights management, tombstone, quarantine, and delete options and enables tiered response based on the severity.

Structured Data Fingerprinting

Fingerprints billions of unique values stored in enterprise databases and systems of record and supports exact match detection of each value.

Unstructured Data Fingerprinting

Fingerprints sensitive files and detects exact match and partial or derivative matches with a policy-defined threshold for percentage similarity to the original.

Policy Violation Management

Offers a unified interface to review DLP violations, take manual action, and rollback an automatic remediation action to restore a file.

Match Highlighting

Displays an excerpt with content that triggered a DLP violation. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.

Pre-Built DLP Templates

Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.

Closed-Loop Policy Enforcement

Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.

Threat Protection

Google Drive SOC

Delivers a threat dashboard and incident-response workflow for insider threats, privileged user threats, and compromised accounts.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.

Account Compromise Analytics

Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts.

Privileged User Analytics

Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.

Malware Protection

Identifies and blocks known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware.

Guided Learning

Provides human input to machine learning models with real time preview showing the impact of a sensitivity change on anomalies detected by the system.

Data Security

Information Rights Management

Applies rights management protection to files uploaded to or downloaded from Google Drive, ensuring sensitive data is protected anywhere.

Platform

Skyhigh Cloud Connector

Connects to cloud services via cloud provider APIs to provide visibility and enforce security and compliance policies for all users and cloud-to-cloud activity.

Skyhigh Enterprise Connector

Facilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.

Integration with On-Premises DLP

Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, Intel McAfee, and Forcepoint.

Integration with SIEMs

Collects log files from SIEMs and provides the ability to report on incidents and events from Skyhigh in SIEM solutions via syslog and API integration.

Integration with IRM

Integrates with leading information rights management
systems to enforce existing policies across sensitive data.

Skyhigh is the #1 CASB

Skyhigh #1 Wreath
Breadth of Functionality

Only CASB to provide DLP, threat protection, access control, and structured data encryption.

Skyhigh #1 Wreath
Breadth of Coverage

Only CASB to cover all users across all devices and support all cloud services, including custom apps on IaaS.

Skyhigh #1 Wreath
Platform Scalability

Only CASB that scales to support 2 billion cloud transactions per day at the world's largest global enterprises.

Skyhigh #1 Wreath
Platform Security

Only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no customer data in our cloud.