McAfee Skyhigh Security Cloud
for Cisco Spark

Enable secure collaboration using Cisco Spark while meeting your security, compliance, and governance requirements

Download Datasheet

Enforce data loss prevention policies across Cisco Spark

McAfee enforces DLP policies for files and messages across Cisco Spark workspaces to ensure compliance with regulations and internal policies. McAfee supports DLP rules based on keywords, data identifiers, user groups, regex, and structured or unstructured fingerprints. Enforcement actions include coach users, notify administrator, block, quarantine, and tombstone. Leverage pre-built DLP templates, create custom policies in McAfee, or leverage policies in an existing on-premises DLP solution.

Unified DLP reporting and remediation

McAfee reports on DLP violations in Cisco Spark and other cloud services in a unified interface with highlighted excerpts revealing the exact content that triggered the DLP policy. During review, if a file does not violate a policy, the reviewer can rollback the remediation action to restore the file and/or its sharing permissions. Quarantined files are stored in a secure account within Cisco Spark, not in McAfee’s platform, for added security.

Deep integration with on-premises DLP solutions

With McAfee you have the option of leveraging our best-in-class DLP engine or the policies in your existing on-premises solution such as Symantec DLP, Intel McAfee DLP, Forcepoint DLP, and more. McAfee optionally performs a first-pass content inspection, brokers inspection by the on-premises solution, acts as an enforcement point to apply policies to data in the cloud, and registers enforcement in the on-premises solution that maintains the policy.

Download the Datasheet

Download the McAfee Skyhigh Security Cloud for Cisco Spark datasheet for a complete list of product capabilities.

Download Now

Detect internal and external threats

McAfee captures a complete record of all user activity in Cisco Spark and leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, McAfee can detect cross-cloud threats that involve usage across Cisco Spark and other cloud services. As threats are resolved, McAfee automatically incorporates this data into its behavioral models to improve detection accuracy.

Insider threats

McAfee automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat, whether the threat is accidental or malicious. Using Guided Learning, you can fine tune the detection of cloud-based threats by providing feedback to the system that is incorporated into models of user behavior to more accurately detect future threats.

 

Compromised accounts

McAfee detects compromised account activity in Cisco Spark based on brute-force login attempts, logins from new and untrusted locations for a specific user, and consecutive login attempts from two locations in a time period that implies impossible travel, even if the two logins occur across two cloud services. Darknet Intelligence reveals user accounts for sale online that are at risk of compromise.

 

“McAfee allows us to extend DLP outside the perimeter and into the cloud, and the user experience is seamless.”

Mike Benson, Chief Information Officer

“Our users never see McAfee even though it is a key part of our IT security strategy, allowing us to keep our users and data safe so they can have global access from any device.”

Jeff Haskill, Chief Information Security Officer

“McAfee helps us understand how employees use Salesforce to identify insider threats, compromised credentials, and excessive privileged user access.”

Mike Bartholomy, Senior Manager, Information Security

Make Cisco Spark your corporate standard

McAfee identifies collaboration solutions that employees use in place of the corporate standard, Cisco Spark, and provides a risk rating for each service. Using McAfee, you can enforce risk-based governance controls and coach users to Cisco Spark to improve collaboration while also reducing cost and risk.

Key Features

Shadow IT Discovery

Discovers all shadow IT cloud services employees are using in place of the corporate standard, Cisco Spark.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Cisco Spark and enforces granular policies such as read-only access.

Usage Analytics

Identifies all users and groups accessing Cisco Spark and reveals which users are accessing sensitive data.

User Groups

Discovers and groups users from directory services and Cisco Spark. User groups can be leveraged for analytics and policy enforcement.

Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, and structured/unstructured fingerprints across data at rest and uploaded or shared in real time.

Pre-Built DLP Templates

Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.

Structured Data Fingerprinting

Fingerprints billions of unique values stored in enterprise databases and systems of record and supports exact match detection of each value.

Unstructured Data Fingerprinting

Fingerprints sensitive files and detects exact match and partial or derivative matches with a policy-defined threshold for percentage similarity to the original.

Multi-Tier Remediation

Provides coach user, notify administrator, block, and delete options and enables tiered response based on severity.

Policy Violation Management

Offers a unified interface to review DLP violations, take manual action, and rollback an automatic remediation action to restore a file.

Match Highlighting

Displays an excerpt with content that triggered a DLP violation. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.

Closed-Loop Policy Enforcement

Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.

Cisco Spark SOC

Delivers a threat dashboard and incident-response workflow to review and remediate insider threats, privileged user threats, and compromised accounts.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.

Account Compromise Analytics

Analyzes login attempts to identify impossible cross- region access, brute-force attacks, and untrusted locations indicative of compromised accounts.

Guided Learning

Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.

Skyhigh Cloud Connector

Connects to cloud services via cloud provider APIs to provide visibility and enforce security and compliance policies for all users and cloud-to-cloud activity.

Skyhigh Enterprise Connector

Facilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.

Integration with On-Premises DLP

Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, Intel McAfee, and Forcepoint.

Integration with SIEMs

Collects log files from SIEMs and provides the ability to report on incidents and events from Skyhigh in SIEM solutions via syslog and API integration.

Let's unleash the power of the cloud

Request a Demo