Salesforce Security Solution

Prevent data loss due to insider threats and compromised accounts and protect data to meet stringent regulatory compliance and data privacy requirements

Download the Datasheet

Privacy Policy

Detect internal and external threats to data in Salesforce

Skyhigh Threat Protection analyzes user activity in Salesforce across multiple heuristics, detects threats, and automatically takes risk-mitigating action. The built-in threat resolution workflow provides a complete audit trail of all user activity to support forensic investigations. As threats are resolved, Skyhigh automatically incorporates this data into its behavioral models to improve detection accuracy.

  • Insider and privileged user threats

    Skyhigh’s machine learning algorithms model typical behavior for a user, group, and time period to detect negligent and malicious behavior, such as an employee downloading sales contacts before leaving for a competitor. The solution also identifies privileged users viewing data outside of their role, degrading security settings, and creating dummy accounts for third-party access.

  • Compromised accounts

    Skyhigh identifies compromised accounts based on consecutive login attempts from two locations in a time period implying impossible travel, login attempts from untrusted locations, and brute force login attempts. The solution also identifies user credentials for sale on the Darknet, revealing accounts at high-risk of compromise to support targeted password update reminders.

Download the Datasheet

Download the Skyhigh for Salesforce datasheet for a complete list of product capabilities.

Download Now
Download the Datasheet
Encrypt structured and unstructured data

Encrypt structured and unstructured data

Skyhigh enables enterprises to protect structured and unstructured data leveraging Salesforce’s native 256-bit AES encryption. Skyhigh integrates with KMIP-compliant key management solutions, on-premises or in the cloud, to broker the use of enterprise-controlled encryption keys across multiple Salesforce instances.

Secure BYOD access to Salesforce

Secure BYOD access to Salesforce

Skyhigh enforces fine-grained access policies, such as allowing contact lookup on unmanaged devices but preventing report downloads to devices without appropriate endpoint security. Skyhigh can also integrate with rights management solutions and apply IRM protection to files downloaded from Salesforce so that data is protected anywhere.

Enforce data loss prevention policies

Enforce data loss prevention policies

Skyhigh enforces DLP policies across data at rest and in motion in standard and custom fields, files, and Chatter posts. Remediation options include user coaching, block, encrypt, administrator notification, and delete. Skyhigh supports pre-built, industry-specific DLP templates and custom policies based on data identifiers, keywords, user groups, and regular expressions. Policy Violation Management provides a unified interface for reporting with a highlighted excerpt revealing the exact content that triggered the DLP violation.

“By leveraging the power of the Salesforce1 Platform, Skyhigh Networks provides customers with the proven social, mobile, and connected cloud technologies to accelerate business success.”

Ron Huddleston, Senior Vice President, Global AppExchange and Partner Program

“Skyhigh helps us understand how employees use Salesforce and identify insider threats, compromised credentials, and excessive privileged user access.”

Mike Bartholomy, Senior Manager, Information Security

“Skyhigh allows us to extend DLP outside the perimeter and into the cloud and the user experience is seamless.”

Mike Benson, Chief Information Officer

“Our users never see Skyhigh even though it is a key part of our IT security strategy, allowing us to keep our users and data safe so they can have global access from any device.”

Jeff Haskill, Chief Information Security Officer

Read the Full Case Study

Privacy Policy

Key Features

Threat Protection

Salesforce SOC

Delivers a threat protection dashboard and incident-response workflow for potential insider threats and compromised accounts.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.

Account Access Analytics

Analyzes login attempts to identify impossible cross-region access, brute- force attacks, and untrusted locations indicative of compromised accounts.

Configurable Sensitivity

Provides an adjustable sensitivity scale for each anomaly type with real-time preview showing the impact of a change on anomalies detected by the system.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.

Darknet Intelligence

Identifies stolen credentials acquired in phishing attacks and leaked from breached cloud services to reveal users and services at risk.

Visibility

Shadow IT Discovery

Identifies any shadow IT cloud services employees are using in place of the corporate standard, Salesforce.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Salesforce and enforces granular policies such as read-only access.

Usage Analytics

Identifies all users and groups accessing Salesforce and reveals which users are accessing sensitive data.

User Groups

Discovers and groups users from directory services and Salesforce. User groups can be leveraged for analytics and policy enforcement.

Compliance

Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, user groups, and regular expressions across standard and custom fields, files, and Chatter posts.

Multimode DLP

Enforces data loss prevention policies for data stored at rest in Salesforce and data uploaded in real time.

Next Generation DLP Engine

Provides a native cloud DLP engine designed for DLP, resulting in greater accuracy and fewer false positives/negatives than third-party engines built for search.

Multi-Tier Remediation

Provides multiple options including coach user, notify administrator, block, and delete and enables tiered response based on severity.

Policy Violation Management

Offers a unified interface to review DLP violations, including content that triggered the violation, with remediation workflow.

Match Highlighting

Displays an excerpt with content that triggered a violation to understand its context. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.

Email Coaching

Delivers customizable email notifications to end users in response to policy violations to coach them on appropriate cloud usage.

Pre-Built DLP Templates

Provides out-of-the-box DLP templates for all major verticals and regulations to help identify sensitive content such as PII, PHI, or IP.

Closed-Loop Policy Enforcement

Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.

Two-Pass Assessment

Optionally performs a first pass DLP assessment in the cloud before downloading potential violations to an on-premises DLP system for evaluation and reporting.

Data Security

Security Configuration Audit

Discovers current Salesforce security settings and suggests modifications to improve security based on industry best practices.

Contextual Access Control

Enables on-premises and mobile access control policies based on user groups, device, and geography with coarse blocking and granular upload, download, and post permissions.

Contextual Authentication

Forces additional authentication steps in real time via integration with identity management solutions based on pre-defined access control policies.

Unmanaged Device Control

Enforces distinct access policies for managed and unmanaged devices by integrating with EMM/MDM solutions and registering and fingerprinting unmanaged devices.

Salesforce Shield Encryption

Protects sensitive data stored at rest by integrating with Salesforce’s native 256-bit AES encryption and brokers the use of enterprise-controlled encryption keys.

Encryption Key Brokering

Integrates with enterprise key management solutions to broker the management and rotation of enterprise encryption keys across multiple Salesforce instances.

Unstructured Data Encryption

Complements Salesforce Shield by adding support for encryption of unstructured data including files and attachments using enterprise-controlled encryption keys.

Information Rights Management

Defines a circle of trust for any document and enforces rights management policies through integration with IRM solutions.

Platform

Persona-Based Navigation

Provides a streamlined user interface and embedded workflows for four distinct personas: governance, compliance, security, and executive.

Role-Based Access Control

Delivers pre-defined roles with granular and customizable permissions to manage the data and product capabilities users can access within Skyhigh.

Enterprise Connector

Collects logs from firewalls, proxies, and SIEMs, integrates with directory services via LDAP, and tokenizes sensitive data before uploading to the cloud.

Privacy Guard

Leverages an irreversible one-way process to tokenize user identifying information on premises and obfuscate enterprise identity.

Integration with On-Premises DLP

Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, Intel McAfee, and Forcepoint.

Integration with SIEMs

Combines Skyhigh anomaly and event data with events from other systems and leverages your existing incident remediation process.

Integration with Key Management Systems

Seamlessly integrates with your existing key management systems using KMIP to broker the transfer of enterprise encryption keys to Salesforce.

Integration with IDM

Leverages identity management (IDM) solutions for pervasive and seamless traffic steering through Skyhigh’s proxy and contextual authentication.

Integration with IRM

Integrates with leading information rights management systems to enforce existing policies across sensitive data.

Flexible Deployment Options

Offers the ability to deploy Skyhigh in the cloud, on premises as a virtual appliance, or in a hybrid model.

Integration with EMM/MDM

Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM certificates.

Total Coverage Architecture

Leverages log collection, forward proxy chaining, packet capture, API, and reverse proxy deployment modes to support all cloud access scenarios.

Skyhigh is the #1 CASB

  • Product Capabilities

    We deliver the most comprehensive set of CASB functions across all cloud services and access scenarios.

  • Customer Success

    Our customer retention rate is the highest in the industry and the direct result of our obsessive customer focus.

  • Market Validation

    Skyhigh is proven at over 600 enterprises with more than 30 million users, including 40% of the Fortune 500.

See a Live Demo

One of our cloud enablement specialists would be delighted to show you Skyhigh in action.

Schedule a demo

Request a Cloud Audit

Get a personalized assessment of all cloud services in use by your employees and their associated risk.

Request a Cloud Audit