Skyhigh for Office 365

Enable use of Microsoft's signature productivity tools anywhere while meeting Office 365 security, compliance, and governance requirements

Download the Datasheet

Privacy Policy

Identify, mitigate, and remediate internal and external threats in real-time

Skyhigh Threat Protection analyzes user activity in Office 365 across multiple heuristics, detects threats, and automatically takes risk-mitigating action such as suspending account access and forcing multi-factor authentication. The built-in threat resolution workflow provides a complete audit trail of all user activity to support forensic investigations.

  • Insider and privileged user threats

    Skyhigh develops an accurate and continuously updated model of behavior for each user and identifies anomalous activity compared with their typical usage and typical usage for other users in their role to surface both accidental and malicious insider threats. Privileged User Analytics detects threats stemming from excessive user permissions, zombie administrator accounts, inappropriate access to data, and unwarranted escalation of privileges and user provisioning.

  • Compromised accounts

    Skyhigh detects compromised accounts in real-time based on access attempts from untrusted geographic locations, consecutive login attempts from two locations that imply impossible travel, and brute force login attempts. Policies can be set to force adaptive authentication in response to detected compromised account to prevent unauthorized access. Darknet Intelligence identifies user credentials for sale online, revealing accounts at risk.

Download the Datasheet

Download the Skyhigh for Office 365 datasheet for a complete list of product capabilities.

Download Now
Download the Datasheet
Enforce data loss prevention policies

Enforce data loss prevention policies

Skyhigh enforces DLP policies across data at rest and in motion based on data identifiers, keywords, and regular expressions to support compliance with internal policies and regulations. Policy actions include alerting, blocking, tombstoning, and quarantining. Leverage pre-built, vertical-specific templates, configure custom policies in Skyhigh, or extend existing policies defined within on-premise DLP systems.

  • Complete incident reporting and remediation

    Skyhigh Policy Violation Management provides a unified interface for reporting on DLP violations across Office 365 applications and other cloud services. Review quarantined files as part of a remediation workflow, and confirm the action or release the file.

  • Platform approach to DLP

    Skyhigh can optionally leverage the DLP policies in on-premises DLP systems from Symantec, EMC RSA, Intel McAfee, and Websense, enforce policies across Office 365, and register enforcement actions in the enterprise DLP system where the policy is managed.

Audit collaboration and enforce sharing policies

Skyhigh analyzes collaboration events and shared links, visualizing summarizing sharing with internal departments, business partners, and personal emails. Secure Collaboration enforces sharing policies based on document content and context, and can revoke sharing attempts that occur outside of policy.

Audit collaboration and enforce sharing policies

“We’re thrilled that Skyhigh is extending its cross-cloud security and governance solution to serve our Office 365 customers.”

Nagesh Pabbisetty, Partner Group Program Manager

“Skyhigh helps us securely enable high-impact cloud services like Office 365 while ensuring data security and compliance with HIPAA and HITECH.”

Mark Dunkerley, Manager of Messaging, Mobile and Video Services

“Skyhigh allows us to extend DLP outside the perimeter and into the cloud, and the user experience is seamless.”

Mike Benson, Chief Information Officer

Standardize on Office 365

Reduce the cost and risk of cloud storage while improving collaboration and productivity by standardizing on Office 365. With Skyhigh’s discovery of all shadow IT cloud storage in use and their associated risk ratings, you can educate users on the perils of redundant, high-risk services in real-time and guide them to use Office 365.

Standardize on Office 365

Read the Full Case Study

Privacy Policy

More than Office 365 Security

Skyhigh Cloud Access Security Broker helps more than 500 enterprises enforce their security, compliance, and governance policies for over 17,000+ cloud services, including Salesforce, ServiceNow, Jive, Box, 0ffice 365, Google Drive, Dropbox, and many more.

More than Office 365 Security

Key Features

Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, and regular expressions and supports alerting, blocking, tombstoning, and quarantining actions.

Pre-Built DLP Templates

Provides out-of-the-box DLP templates for all major verticals and regulations to help identify sensitive content such as PII, PHI, or IP.

Collaboration Analytics

Identifies collaboration with third-party business partners, assesses the risk of each partner, monitors data access, and reports on policy exceptions.

Secure Collaboration

Enforces external sharing policies based on domain whitelist/blacklist and content and educates users on acceptable collaboration policies.

Sensitive Data Analytics

Provides a detailed and continuous view of sensitive data stored or uploaded to cloud services including the data location and users who have accessed it.

On-Demand Data Scan

Examines existing content to identify sensitive data subject to compliance requirements or security policies.

Policy Violation Management

Offers a unified interface to both review and remediate all DLP, access control, or collaboration policy violations.

On-Premises DLP Integration

Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, EMC RSA, Intel McAfee, and Websense.

Closed-Loop Policy Enforcement

Leverages policies in existing DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.

Contextual Access Control

Enables on-premises and mobile access control policies based on user, device, and geography with coarse blocking and granular view, edit, and download permissions.

Office 365 SOC

Delivers an Office 365 security intelligence dashboard and incident-response workflow for potential insider/privileged user threats, compromised accounts, and flight risks.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and admin activities to support post-incident investigations and forensics.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies anomalies indicative of insider threat data exfiltration.

Geo-Location Analytics

Visualizes global access patterns and analyzes activity to identify impossible cross-region access attempts indicative of compromised accounts.

Privileged User Analytics

Identifies excessive user permissions, zombie administrator accounts, inappropriate access to data, and unwarranted escalation of privileges and user provisioning.

Adaptive Authentication

Forces additional authentication steps in real-time in response to high-risk behaviors by integrating with single sign-on solutions.

Shadow IT Discovery

Identify any shadow IT cloud services employees are using in place of the corporate standard, OneDrive, Yammer, and SharePoint.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Office 365 and enforces granular policies such as read-only access.

Searchable Symmetric Encryption

Encrypts unstructured data and leverages advancements in encrypted search indexes to enable end-user search without compromising Office 365 security.

Key Management Support

Provides flexible cloud or on-premises deployment options and integrates with leading key management servers supporting the KMIP protocol.

Preservation of Application Functionality

Preserves end-user functions such as search, sort, and format using academia and peer-reviewed encryption schemes.

Rights Management

Defines a circle of trust for any document and enforces rights management policies for intellectual property through integration with DRM solutions.

Device Fingerprinting

Identifies individual devices as managed or unmanaged based on a unique device fingerprint to enable distinct access policies for unmanaged devices.

Seamless SSO Integration

Integrates with single sign-on (SSO) solutions, enabling pervasive and seamless policy enforcement including access control and encryption.

Only Skyhigh

See a Live Demo

One of our cloud enablement specialists would be delighted to show you Skyhigh in action.

Schedule a Demo

Request an Office 365 Audit

Get a personalized audit of your organization’s Office 365 environment.

Request an Office 365 Audit