X

The Next Next Big Thing

Skyhigh for Amazon Web Services

Protect your AWS infrastructure from security threats and compliance risks with comprehensive monitoring, auditing, and remediation

Detect internal and external threats to AWS infrastructure

Skyhigh captures a complete record of all user activity in Amazon Web Services (AWS) across multiple heuristics, detects threats, automatically takes risk-mitigating action, and supports forensic investigations. As threats are resolved, Skyhigh automatically incorporates this data into its behavioral models to improve detection accuracy.

Compromised accounts

Skyhigh detects compromised account activity in AWS based on brute force login attempts, logins from new and untrusted locations for a specific user, and consecutive login attempts from two locations in a time period that implies impossible travel – even if the two logins occur across multiple cloud services – to support immediate remediation and limit exposure.

Insider and privileged user threats

Skyhigh automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and group to identify activity indicative of insider threat. Privileged User Analytics identifies risk from inactive administrator accounts, excessive permissions, and unwarranted escalation of privileges and user provisioning.

Download the Datasheet

Download the Skyhigh for Amazon Web Services datasheet for a complete list of product capabilities

Download Now

Audit Identity and Access Management (IAM) permissions

Skyhigh audits the Identity and Access Management (IAM) permissions assigned to users and inherited from group membership, highlighting inactive user accounts that can be deleted to reduce the attack surface. IAM Group Analytics discovers groups without active members that can be deleted.


Audit AWS security and compliance configuration

Skyhigh continuously monitors and audits AWS security configuration settings to ensure compliance with external regulations and internal policies. Skyhigh uses field-tested industry best practices to suggest modifications to configuration settings to tighten security and ensure compliance.

“Skyhigh continues to expand its security controls beyond SaaS to help companies cover their custom-built applications running in IaaS including the IaaS platforms themselves.”

David Smoley, Chief Information Officer

“Skyhigh helps us understand how employees use the cloud to identify insider threats, compromised credentials, and excessive privileged user access.”

Mike Bartholomy, Senior Manager, Information Security

“In an environment with millions of unique events each day, Skyhigh does a nice job of cutting through the noise and directing us to the areas of greatest security concern.”

Ralph Loura, Chief Information Officer

“Skyhigh allows us to have more control over data security by adding an additional layer of protection beyond what the typical cloud service provider can offer.”

Jenai Marinkovic, Chief Security Officer

Standardize on a corporate AWS account

Skyhigh identifies all AWS accounts in use by employees and enables enterprises to standardize on their corporate AWS account. Using Skyhigh, you can enforce governance controls and coach users to corporate AWS accounts for centralized visibility and policy enforcement.

Key Features

Amazon Usage Discovery

Identifies AWS usage across unmanaged and corporate accounts and enables enterprises to enforce a uniform set of policies on all AWS accounts.

Security Configuration Audit

Discovers current cloud application security settings and suggests modifications to improve security based on industry best practices.

Compliance Audit

Continuously monitors AWS configuration against regulatory requirements to streamline internal and external audits.

Cloud Activity Monitoring

Leverages AWS CloudTrail to capture a complete audit trail of all user and administrator activities to support post-incident investigations and forensics.

User Permissions Audit

Audits the identity and access management (IAM) permissions assigned individually to each user account and inherited from group membership.

Account Access Analytics

Identifies inactive user accounts and former employees who retain access to AWS so their accounts can be deleted to reduce latent risk.

IAM Group Analytics

Identifies groups with no members and groups without active members that can be deleted to reduce risk.

User Access Dashboard

Presents a unified view of IAM permissions assigned and access across AWS enterprise accounts to manage access policies.

AWS SOC

Delivers a threat dashboard and incident-response workflow to review and remediate insider threats, privileged user threats, and compromised accounts.

Threat Modeling

Correlates multiple anomalous events within AWS or across AWS and other cloud services to accurately separate true threats from simple anomalies.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.

Privileged User Analytics

Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.

Account Compromise Analytics

Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts.

Guided Learning

Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.

Enterprise Connector

Facilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.

Privacy Guard

Leverages an irreversible one-way process to tokenize user identifying information on premises and obfuscate enterprise identity.

Integration with SIEMs

Collects log files from SIEMs and provides the ability to report on incidents and events from Skyhigh in SIEM solutions via syslog and API integration.

Integration with IDM

Leverages identity management (IDM) solutions for pervasive and seamless traffic steering through Skyhigh Gateway and contextual authentication.

Skyhigh is the #1 CASB

Skyhigh #1 Wreath
Breadth of Functionality

Only CASB to provide DLP, threat protection, access control, and structured data encryption in unified one product.

Skyhigh #1 Wreath
Breadth of Coverage

Only CASB to cover all cloud services (SaaS, PaaS & IaaS), all devices (managed and unmanaged) and from anywhere (on and off network)

Skyhigh #1 Wreath
Platform Scalability

Only CASB that scales to support 2 billion cloud transactions per day at the world’s largest global enterprises.

Skyhigh #1 Wreath
Platform Security

Only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no sensitive customer data in our cloud.