Skyhigh for Google Drive

Empower your employees with anywhere access to collaboration while enforcing security and compliance policies

Download the Datasheet

Privacy Policy

Enforce data loss prevention to comply with external regulations and internal policies

Ensure compliance with regulations such as PCI DSS, HIPAA-HITECH, GLBA, SOX, CIPA, FISMA, and FERPA by applying comprehensive data loss prevention capabilities to new or existing content within Google Drive.

  • Enforce comprehensive DLP policies

    Skyhigh protects data by enforcing granular DLP policies based on keywords, regular expressions, file characteristics, and user activity. Leverage pre-built, vertical-specific templates or extend existing policies defined within on-premise DLP systems.

  • Deploy flexible, closed-loop workflows

    Enforce a broad range of actions including alerting, blocking, tombstoning, and quarantining. Closed-loop remediation with on-premise DLP systems from Symantec, EMC RSA, Intel McAfee, and Websense enables you to utilize existing workflows.

Download the Datasheet

Download the Skyhigh for Google Drive datasheet for a complete list of product capabilities.

Download Now
Download the Datasheet

Standardize on Google Drive

Reduce the cost and risk of cloud storage while improving collaboration and productivity by standardizing on Google Drive. With Skyhigh’s discovery of all shadow IT cloud storage in use and their associated risk ratings, you can educate users on the perils of redundant, high risk services in real-time and guide them to use Google Drive.

Standardize on Google Drive
Your Google Drive security operations center

Your Google Drive security operations center

Manage Google Drive security from a unified dashboard and protect data from compromised accounts and insider threats. Feed all incidents into your existing SIEMs for consistent reporting and remediation.

  • Powered by machine learning

    Monitor usage and leverage big data analytics to identify compromised account or insider threat security risks stemming from inappropriate privileged access, cross-region access, excessive access, and data exfiltration.

  • Visibility into the entire G-Drive environment

    Track all user and admin activities including uploads, downloads, views, edits, and deletes for compliance and investigations. Understand how content flows externally with analysis of shared links and external collaborations.

“Skyhigh allows us to have more control over data security by adding an additional layer of protection beyond the typical cloud service provider can offer.”

Jenai Marinkovic, Chief Security Officer

“In an environment with millions of unique events each day, Skyhigh does a nice job of cutting through the noise and directing us to the areas of greatest security concern.”

Ralph Loura, Chief Information Officer

“We’re seeing both costs and risk go down as a result of our work with Skyhigh.”

Mike Bartholomy, Senior Manager of Information Security

“When IT can bring the audit committee and executive members together and they are comfortable using the cloud, it is huge. Skyhigh is mitigating and lowering risk. It's a fact.”

Jeff Haskill, Chief Information Security Officer

“With Skyhigh we were able to implement cloud security policies without impacting business user productivity.”

Brian Lillie, Chief Information Officer

Seamless integration with the Google Drive ecosystem

Seamless integration with the Google Drive ecosystem

Preserve all application functionality and ensure consistent enforcement of policies across all devices and browser, mobile, and sync clients and SSO services such as Okta, OneLogin, and Ping Identify.

Read the Full Case Study

Privacy Policy

More than Google Drive

Skyhigh Cloud Access Security Broker helps more than 600 enterprises enforce their security, compliance, and governance policies for over 20,000+ cloud services, including Salesforce, ServiceNow, Box, Office 365, Google Drive, Dropbox and many more.

More than Google Drive

Key Features

Shadow IT Discovery

Identify any shadow IT cloud services employees are using in place of the corporate standard, Google Drive.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Google Drive and enforces granular policies such as read-only access.

On-Demand Data Scan

Examines existing content to identify sensitive data subject to compliance requirements or security policies.

Usage Analytics

Identifies all users and groups accessing Google Drive and reveals which users are accessing sensitive data.

Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, and regular expressions and supports alerting, tombstoning, and quarantining actions.

Purpose-Built Native DLP Engine

Provides a native DLP engine designed specifically for DLP, resulting in greater accuracy and fewer false positives/negatives than third-party engines built for search.

Enterprise-Class Remediation

Provides multiple remediation options including tombstone, quarantine, and delete and enables tiered response based on the severity of the violation.

Pre-Built DLP Templates

Provides out-of-the-box Google Drive DLP templates for all major verticals and regulations to help identify sensitive content such as PII, PHI, or IP.

Policy Violation Management

Offers a unified interface to both review and remediate all DLP policy violations.

Closed-Loop Policy Enforcement

Leverages policies in existing DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.

Enterprise Connector

Collects logs from firewalls, proxies, and SIEMs, integrates with directory services via LDAP, and tokenizes sensitive data before uploading to the cloud.

Integration with On-Premises DLP

Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, EMC RSA, Intel McAfee, and Websense.

Integration with SIEMs

Combine Skyhigh anomaly and event data with events from other systems and leverage your existing incident remediation process.

On-Network and Off-Network Support

Supports on-network and off-network access without requiring additional agents.

Flexible Deployment Options

Offers the ability to deploy Skyhigh in the cloud, on premises as a virtual appliance, or in a hybrid model.

Email Alerts

Provides instantaneous or periodic email alerts for changes to service risk, security breaches, and user events with configurable thresholds.

Comprehensive Deployment Architecture

Leverages a complete coverage model including log analysis and API deployment modes to support all cloud access scenarios.

High Availability Infrastructure

Provides a 99.5% uptime SLA by leveraging a robust cloud infrastructure, ensuring continuous and performant access for all users across the globe.

Skyhigh is the #1 CASB

  • Product Capabilities

    We deliver the most comprehensive set of CASB functions across all cloud services and access scenarios.

  • Customer Success

    Our customer retention rate is the highest in the industry and the direct result of our obsessive customer focus.

  • Market Validation

    Skyhigh is proven at over 600 enterprises with more than 30 million users, including 40% of the Fortune 500.

See a Live Demo

One of our cloud enablement specialists would be delighted to show you Skyhigh in action.

Schedule a Demo

Request a Cloud Audit

Get a personalized assessment of all cloud services in use by your employees and their associated risk.

Request a Cloud Audit