Skyhigh for ServiceNow

Meet strict data privacy and compliance requirements while delivering an uncompromised cloud-first experience

Encrypt data with enterprise-owned keys

Protect structured and unstructured data with standards-based AES encryption, function-preserving encryption, and tokenization to ensure sensitive infrastructure data is protected.

Preserve application functionality

Support critical end-user functionality such as search, sort, and format by selecting from a variety of academia- and peer-reviewed encryption schemes developed in collaboration with experts in the industry.

Own your encryption keys

Integrate with any KMIP-compliant key management server, enabling you to maintain control of your keys and comply with industry regulations and security policies.

Download the Datasheet

Download the Skyhigh for ServiceNow datasheet for a complete list of product capabilities.

Download Now

Gain visibility into ServiceNow usage and prevent misuse

Understand all user, admin and third party applications accessing ServiceNow data. Capture all activities including uploads, downloads, views, edits, and deletes to support forensics investigations. Leverage machine learning to identify anomalous behavior indicative of compromised accounts or insider threats. Manage ServiceNow security from a unified dashboard or feed security incidents into your existing SIEMs for consistent reporting and remediation.

“Skyhigh allows us to have more control over data security by adding an additional layer of protection beyond the typical cloud service provider can offer.”

Jenai Marinkovic, Chief Security Officer

“In an environment with millions of unique events each day, Skyhigh does a nice job of cutting through the noise and directing us to the areas of greatest security concern.”

Ralph Loura, Chief Information Officer

“When IT can bring the audit committee and executive members together and they are comfortable using the cloud, it is huge. Skyhigh is mitigating and lowering risk. It's a fact.”

Jeff Haskill, Chief Information Security Officer

“We’re seeing both costs and risk go down as a result of our work with Skyhigh.”

Mike Bartholomy, Senior Manager of Information Security

Seamless integration with the ServiceNow ecosystem

Preserve all application functionality and ensure consistent enforcement of policies across all devices and browser, mobile, and sync clients and SSO services such as Okta, OneLogin, and Ping Identify.

More than ServiceNow

Skyhigh Cloud Access Security Broker helps more than 600 enterprises enforce their security, compliance, and governance policies for over 20,000+ cloud services, including Salesforce, ServiceNow, Box, 0365, Google Drive, Dropbox and many more.

Key Features

Governance

Shadow IT Discovery

Discovers all shadow IT cloud services employees are using in place of the corporate standard, ServiceNow.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to ServiceNow and enforces granular policies such as read-only access.

Usage Analytics

Identifies all users and groups accessing ServiceNow and reveals which users are accessing sensitive data.

User Groups

Discovers and groups users from directory services and ServiceNow. User groups can be leveraged for analytics and policy enforcement.

Threat Protection

ServiceNow SOC

Delivers a threat dashboard and incident-response workflow to review and remediate insider threats, privileged user threats, and compromised accounts.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.

Account Compromise Analytics

Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts.

Privileged User Analytics

Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.

Malware Protection

Identifies and blocks known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware.

Threat Modeling

Correlates multiple anomalous events within an application or across applications to accurately separate true threats from simple anomalies.

Guided Learning

Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.

Compliance

Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, and structured/unstructured fingerprints across data uploaded in real time.

Multi-Tier Remediation

Provides coach user, notify administrator, block, and apply rights management options and enables tiered response based on severity.

Match Highlighting

Displays an excerpt with content that triggered a violation. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.

Structured Data Fingerprinting

Fingerprints billions of unique values stored in enterprise databases and systems of record and supports exact match detection of each value.

Unstructured Data Fingerprinting

Fingerprints sensitive files and detects exact match and partial or derivative matches with a policy-defined threshold for percentage similarity to the original.

Policy Violation Management

Offers a unified interface to review DLP violations, including content that triggered the violation, with remediation workflow.

Pre-Built DLP Templates

Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.

Closed-Loop Policy Enforcement

Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.

Data Security

Contextual Access Control

Enforces policies based on user, managed/unmanaged device, and geography with coarse and activity-level enforcement.

Contextual Authentication

Forces additional authentication steps in real-time via integration with identity management solutions based on pre-defined access control policies.

Encryption and Tokenization

Delivers peer-reviewed, function-preserving encryption schemes using enterprise-controlled keys, and tokenization for data at rest and in transit.

Information Rights Management

Applies rights management protection to files uploaded to or downloaded from ServiceNow, ensuring sensitive data is protected anywhere.

Platform

Skyhigh Gateway

Enforces policies with an inline proxy and steers traffic via device agent, proxy chaining, DNS, and identity providers to cover all access scenarios.

Skyhigh Enterprise Connector

Facilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.

Integration with Key Management Systems

Seamlessly integrates with your existing key management systems using KMIP to encrypt data with enterprise-controlled keys.

Integration with SIEMs

Collects log files from SIEMs and provides the ability to report on incidents and events from Skyhigh in SIEM solutions via syslog and API integration.

Integration with IDM

Leverages identity management (IDM) solutions for pervasive and seamless traffic steering through Skyhigh’s proxy and contextual authentication.

Integration with IRM

Integrates with leading information rights management systems to enforce existing policies across sensitive data.

Integration with EMM/MDM

Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM certificates.

Skyhigh is the #1 CASB

Skyhigh #1 Wreath
Breadth of Functionality

Only CASB to provide DLP, threat protection, access control, and structured data encryption.

Skyhigh #1 Wreath
Breadth of Coverage

Only CASB to cover all users across all devices and support all cloud services, including custom apps on IaaS.

Skyhigh #1 Wreath
Platform Scalability

Only CASB that scales to support 2 billion cloud transactions per day at the world's largest global enterprises.

Skyhigh #1 Wreath
Platform Security

Only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no customer data in our cloud.