Office 365 Security Solution

Enable use of Microsoft's signature productivity tools anywhere while meeting Office 365 security, compliance, and governance requirements

Skyhigh for Office 365 in 2 MinutesClose play button

Download the Datasheet

Privacy Policy

Protect against internal and external threats to data in Office 365

Skyhigh captures a complete record of all user activity in Office 365 and leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, Skyhigh can detect cross-cloud threats. In response, Skyhigh takes immediate action to suspend access or force multi-factor authentication to reinforce Office 365 security.

  • Insider threats

    Skyhigh automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat, whether the threat is accidental or malicious. In response, Skyhigh can alert security admins and terminate access. Privileged User Analytics identifies risk from dormant administrator accounts, excessive permissions, and unnecessary escalation of privileges and user provisioning.

  • Compromised accounts

    Skyhigh detects compromised account activity in Office 365 based on brute force login attempts, logins from new and untrusted locations for a specific user, and consecutive login attempts from two locations in a time period that implies impossible travel. In real time, Skyhigh responds to threats and protects data by requiring additional authentication factors. Darknet Intelligence reveals user accounts for sale online that are at risk of compromise.

Download the Datasheet

Download the Skyhigh for Office 365 datasheet for a complete list of product capabilities.

Download Now
Download the Datasheet
Office 365 data loss prevention

Office 365 data loss prevention

Skyhigh enforces DLP policies for data at rest and in motion to ensure compliance with regulations and internal policies. Skyhigh supports rules based on keywords, data identifiers, and regular expressions. Enforcement actions include alerting, tombstoning, blocking, and quarantining. Leverage pre-built industry templates, create custom policies in Skyhigh, or leverage policies in an existing on-premises DLP solution.

  • Unified DLP reporting and remediation

    Skyhigh reports on DLP violations in all Office 365 applications and other cloud services in a unified interface. During review, if a file does not violate a policy, the reviewer can rollback the remediation action to restore the file and/or its sharing permissions. Quarantined files are stored in a secure account within Office 365, not in Skyhigh’s platform, for added security.

  • Flexible DLP platform

    Skyhigh can integrate with leading on-premises DLP solutions from Symantec, EMC RSA, Intel McAfee, and Websense to enforce existing DLP policies. Skyhigh brokers content inspection by on-premises solutions, acts as an enforcement point to apply actions to files in the cloud, and registers enforcement actions in the on-premises DLP solution that maintains the policy.

Analyze sharing and enforce collaboration policies

Skyhigh audits collaboration activity and visually summarizes all sharing events within the organization, with partners, with personal emails, and via untraceable shared links. Secure Collaboration enforces collaboration policies based on sharing activity and document content, and can take action by modifying permissions and links.

Analyze sharing and enforce collaboration policies

“Using Skyhigh along with Microsoft Graph, companies can leverage the massive productivity gains enabled by Office 365 while meeting their various compliance, threat protection and data security requirements.

Rob Lefferts, General Manager, Extensibility at Microsoft

“Skyhigh helps us securely enable high-impact cloud services like Office 365 while ensuring data security and compliance with HIPAA and HITECH.”

Mark Dunkerley, Manager of Messaging, Mobile and Video Services

“Skyhigh allows us to extend DLP outside the perimeter and into the cloud, and the user experience is seamless.”

Mike Benson, Chief Information Officer

Make Office 365 your corporate standard

Skyhigh identifies all file sharing and collaboration solutions that employees use in place of the corporate standard, Office 365, and provides a risk rating for each service. Using Skyhigh, you can enforce risk-based governance controls and coach users to Office 365 to improve collaboration while also reducing cost and risk.

Make Office 365 your corporate standard

Read the Full Case Study

Privacy Policy

More than Office 365 security

Skyhigh Cloud Access Security Broker helps more than 500 enterprises enforce their security, compliance, and governance policies for over 17,000 cloud services, including Salesforce, ServiceNow, Box, Office 365, Google Drive, Dropbox, and many more.

More than Office 365 security

Key Features


Shadow IT Discovery

Identify any shadow IT cloud services employees are using in place of the corporate standard, OneDrive, Yammer, and SharePoint.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Office 365 and enforces granular policies such as read-only access.

On-Demand Data Scan

Examines existing content to identify sensitive data subject to compliance requirements or security policies.

Usage Analytics

Identifes all users and groups accessing Office 365 and reveals which users are accessing sensitive data.

Collaboration Analytics

Visually summarizes sharing with third-party business partners, personal emails, and internal users and reports on policy exceptions.

Threat Protection

Office 365 SOC

Delivers a threat protection dashboard and incident-response work flow for potential insider/privileged user threats, compromised accounts, and flight risks.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies anomalies indicative of insider threat data exfiltration.

Geo-Location Analytics

Visualizes global access patterns and analyzes activity to identify impossible cross-region access attempts indicative of compromised accounts.

Privileged User Analytics

Identifies excessive user permissions, zombie administrator accounts, inappropriate access to data, and unwarranted escalation of privileges and user provisioning.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and admin activities to support post-incident investigations and forensics.

Adaptive Authentication

Forces additional authentication steps in real-time in response to high-risk behaviors by integrating with identity management solutions.


Secure Collaboration

Enforces external sharing policies based on domain whitelist/blacklist and content and educates users on acceptable collaboration policies.

Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, and regular expressions and supports alerting, blocking, tombstoning, and quarantining actions.

Purpose-Built Native DLP Engine

Provides a native DLP engine designed specifically for DLP, resulting in greater accuracy and fewer false positives/negatives than third-party engines built for search.

Enterprise-Class Remediation

Provides multiple remediation options including block, encrypt, quarantine, and delete and enables tiered response based on the severity of the violation.

Pre-Built DLP Templates

Provides out-of-the-box Office 365 DLP templates for all major verticals and regulations to help identify sensitive content such as PII, PHI, or IP.

Policy Violation Management

Offers a uni ed interface to both review and remediate all DLP, access control, or collaboration policy violations.

Closed-Loop Policy Enforcement

Leverages policies in existing DLP systems, enforce policies, and registers enforcement actions in the DLP system where the policy is managed.

Data Security

Contextual Access Control

Enables on-premises and mobile access control policies based on user, device, and geography with coarse blocking and granular view, edit, and download permissions.

Contextual Authentication

Forces additional authentication steps in real-time via integration with identity management solutions based on pre-defined access control policies.

Device Registration

Registers devices accessing cloud services and associates them with trusted user accounts to enable distinct access policies for managed and unmanaged devices.

Device Fingerprinting

Generates a unique endpoint device fingerprint based on over 23 attributes that persistently identifies each unmanaged device to support access control policies.

Multimode Encryption

Identifies and encrypts existing data found in Office 365 and transparently encrypts new data uploaded to the cloud in real time.

Searchable Symmetric Encryption

Encrypts unstructured data and leverages advancements in encrypted search indexes to enable end-user search without compromising security.

Preservation of Application Functionality

Preserves end-user functions such as search, sort, and format using academia and peer-reviewed encryption schemes.

Information Rights Management

Defines a circle of trust for any document and enforces rights management policies for intellectual property through integration with IRM solutions.


Enterprise Connector

Collects logs from firewalls, proxies, and SIEMs, integrates with directory services via LDAP, and tokenizes sensitive data before uploading to the cloud.

Integration with On-Premises DLP

Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, EMC RSA, Intel McAfee, and Websense.

Integration with SIEMs

Combine Skyhigh anomaly and event data with events from other systems and leverage your existing incident remediation process.

Integration with Key Management Systems

Seamlessly integrates with your existing key management systems using KMIP to encrypt data with enterprise-controlled keys.

Seamless IDM Integration

Integrates with identity management (IDM) solutions, enabling pervasive and seamless policy enforcement, and adaptive and contextual authentication.

On-Network and Off-Network Support

Supports on-network and off-network access without requiring additional agents.

Flexible Deployment Options

Offers the ability to deploy Skyhigh in the cloud, on premises as a virtual appliance, or in a hybrid model.

Email Alerts

Provides instantaneous or periodic email alerts for changes to service risk, security breaches, and user events with configurable thresholds.

Comprehensive Deployment Architecture

Leverages a complete coverage model including log analysis, API, and reverse proxy deployment modes to support all cloud access scenarios.

Only Skyhigh

See a Live Demo

One of our cloud enablement specialists would be delighted to show you Skyhigh in action.

Schedule a Demo

Request an Office 365 Audit

Get a personalized audit of your organization’s Office 365 environment.

Request an Office 365 Audit