Skyhigh for Custom Applications

Extend security controls to internally developed applications deployed in IaaS platforms with no coding or development required

Enforce data loss prevention policies across all custom applications

Skyhigh enforces DLP policies across data uploaded in real time to ensure compliance with regulations and internal policies. Skyhigh supports DLP rules based on keywords, data identifiers, user groups, and regular expressions. Enforcement actions include notify administrator, block, and encrypt. Leverage pre-built industry templates, create custom policies in Skyhigh, or leverage policies in an existing on-premises DLP solution.

Unified DLP reporting and remediation

Skyhigh reports on DLP violations across all custom applications and other cloud services in a unified interface and provides multi-tier remediation options including notify administrator, encrypt, and block.

Deep integration with on-premises DLP solutions

With Skyhigh you have the option of leveraging our best-in-class DLP engine or the policies in your existing on-premises solution such as Symantec DLP, Intel McAfee DLP, Forcepoint DLP, and more.

Download the Datasheet

Download the Skyhigh for Custom Applications datasheet for a complete list of product capabilities

Download Now

Secure BYOD access to custom applications

Skyhigh enforces access control policies based on user groups, device, activity, and geography with coarse blocking and granular activity-level permissions. Skyhigh integrates with EMM/MDM solutions to enforce distinct access policies based on device management status, such as allowing unmanaged devices to preview in the browser but not download files.

Capture an audit trail of user activity

Skyhigh captures an audit trail of all user activity in custom applications and supports post-incident forensic investigations as part of Skyhigh’s complete incident response workflow.

Detect internal and external threats

Skyhigh leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, Skyhigh can detect cross-cloud threats that involve usage across all custom applications and other cloud services. As threats are resolved, Skyhigh automatically incorporates this data into its behavioral models to improve detection accuracy.

Insider and privileged user threats

Skyhigh automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat. Privileged User Analytics identifies risk from dormant administrator accounts, excessive permissions, and unnecessary escalation of privileges and user provisioning.

Compromised accounts

Skyhigh detects compromised account activity in custom applications based on brute force login attempts, logins from new and untrusted locations, and consecutive login attempts from two locations in a time period that implies impossible travel – even if the two logins occur across multiple cloud services – to support immediate remediation and limit exposure.

“Skyhigh continues to expand its security controls beyond SaaS to help companies cover their custom-built applications running in IaaS including the IaaS platforms themselves.”

David Smoley, Chief Information Officer

“Skyhigh allows us to extend DLP outside the perimeter and into the cloud and the user experience is seamless.”

Mike Benson, Chief Information Officer

“Skyhigh helps us understand how employees use the cloud to identify insider threats, compromised credentials, and excessive privileged user access.”

Mike Bartholomy, Senior Manager, Information Security

“In an environment with millions of unique events each day, Skyhigh does a nice job of cutting through the noise and directing us to the areas of greatest security concern. ”

Ralph Loura, Chief Information Officer

Encrypt files with enterprise-owned keys

Protect unstructured data stored in custom applications with standards-based AES encryption. Skyhigh integrates with any KMIP-compliant key management server, enabling enterprises to maintain control of encryption keys and comply with industry regulations and internal security policies.

Custom application security without coding

Skyhigh extends visibility and security controls to custom applications without making changes to the application code. AI-Driven Activity Mapper automatically maps the signature of any application against a uniform set of canonical activities, enabling standardized controls across applications.

Key Features


Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, and regular expressions across data uploaded in real time.

Pre-Built DLP Templates

Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.

Next Generation DLP Engine

Provides a native cloud DLP engine designed for DLP, resulting in greater accuracy and fewer false positive/negatives than third-party engines built for search.

Multi-Tier Remediation

Provides multiple options including notify administrator, block, and encrypt, and enables tiered response based on severity.

Policy Violations Management

Offers a unified interface to review DLP violations in context and perform remediation to resolve an incident or mark as a false positive.


Custom Apps Discovery

Discovers all internally developed applications deployed on public cloud platforms so enterprises can assess their security and compliance risks.

AI-Driven Activity Mapper

Leverages artificial intelligence to map each user action to a uniform set of activities, enabling standardized controls across applications without coding.

Threat Protection

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and administrator actvities to support post-incident investigations and forensics.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patters of activity indicative of a malicious or negligent insider threat.

Privileged User Analytics

Identifies excessive user permissions, zombie administrator accounts, inappropriate access to data, and unwarranted escalation of privileges and user provisioning.

Account Compromise Analytics

Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts.

Cloud SOC

Delivers a threat protection dashboard and incident response workflow to remediate potential insider threats, privileged user threats, and compromised accounts.

Threat Modeling

Correlates multiple anomalous events within an application or across applications to accurately separate true threats from simple anomalies.

Guided Learning

Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.

Data Security

Contextual Access Control

Enables on-premises and mobile access control policies based on user, device, activity, and geography.

Contextual Authentication

Forces additional authentication steps in real-time via integration with identity management solutions based on pre-defined access control policies.

Unmanaged Device Control

Enforces distinct access policies for managed and unmanaged devices by integrating with EMM/MDM solutions and registering and fingerprinting unmanaged devices.

Unstructured Data Encryption

Seamlessly encrypts files uploaded to the cloud using enterprise-controlled encryption keys and enables transparent end-user access to encrypted data.


Codeless App Integration

Supports visibility and security controls across any web application you deploy in the cloud without making changes to the application code.

Comprehensive IaaS Platform Support

Provides support for all leading IaaS platforms including Amazon Web Services, Microsoft Azure, and Google Cloud Platform.

Flexible Deployment Options

Delivers Skyhigh Gateway via SaaS and IaaS virtual machine form factors to meet all management, performance, and privacy requirements.

Unified Management Console

Offers a unified management interface to deploy policy updates and manage versions across staging and production environments.

Integration with SIEMs

Combines Skyhigh anomaly and event data with events from other systems and leverages your existing incident remediation process.

Integration with IDM

Integrates with identity management (IDM) solutions, enabling pervasive and seamless policy enforcement and contextual authentication.

Integration with EMM/MDM

Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM certificates.

Skyhigh is the #1 CASB

Breadth of Functionality

Only CASB to provide DLP, threat protection, access control, and structured data encryption in unified one product.

Breadth of Coverage

Only CASB to cover all cloud services (SaaS, PaaS & IaaS), all devices (managed and unmanaged) and from anywhere (on and off network)

Platform Scalability

Only CASB that scales to support 2 billion cloud transactions per day at the world’s largest global enterprises.

Platform Security

Only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no sensitive customer data in our cloud.