Skyhigh for Slack

Bring communication together using Slack’s real-time messaging and collaboration while meeting security, compliance, and governance requirements

Download Datasheet

Enforce data loss prevention policies across Slack

Skyhigh enforces DLP policies for files and messages across Slack channels to ensure compliance with regulations and internal policies. Skyhigh supports DLP rules based on keywords, data identifiers, user groups, and regular expressions. Enforcement actions include coach users, notify administrator, block, encrypt, quarantine, and tombstone. Leverage pre-built industry templates, create custom policies in Skyhigh, or leverage policies in an existing on-premises DLP solution.

Unified DLP reporting and remediation

Skyhigh reports on DLP violations in Slack and other cloud services in a unified interface with highlighted excerpts revealing the exact content that triggered the DLP policy. During review, if a file does not violate a policy, the reviewer can rollback the remediation action to restore the file and/or its sharing permissions. Quarantined files are stored in a secure account within Slack, not in Skyhigh’s platform, for added security.

Deep integration with on-premises DLP solutions

With Skyhigh you have the option of leveraging our best-in-class DLP engine or the policies in your existing on-premises solution such as Symantec DLP, Intel McAfee DLP, Forcepoint DLP, and more. Skyhigh optionally performs a first-pass content inspection, brokers inspection by the on-premises solution, acts as an enforcement point to apply policies to data in the cloud, and registers enforcement in the on-premises solution that maintains the policy.

Download the Datasheet

Download the Skyhigh for Slack datasheet for a complete list of product capabilities.

Download Now

Detect internal and external threats

Skyhigh captures a complete record of all user activity in Slack and leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, Skyhigh can detect cross-cloud threats that involve usage across Slack and other cloud services. As threats are resolved, Skyhigh automatically incorporates this data into its behavioral models to improve detection accuracy.

Insider threats

Skyhigh automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat, whether the threat is accidental or malicious. Using Guided Learning, you can fine tune the detection of cloud-based threats by providing feedback to the system that is incorporated into models of user behavior to more accurately detect future threats.

Compromised accounts

Skyhigh detects compromised account activity in Slack based on brute force login attempts, logins from new and untrusted locations for a specific user, and consecutive login attempts from two locations in a time period that implies impossible travel, even if the two logins occur across two cloud services. Darknet Intelligence reveals user accounts for sale online that are at risk of compromise.


Secure BYOD access to Slack

Skyhigh enforces fine-grained access policies, such as allowing document preview on unmanaged devices but preventing downloads to devices without appropriate endpoint security. Skyhigh can also integrate with identity management solutions to require additional factors of authentication for users based on device or access patterns.

“Skyhigh allows us to extend DLP outside the perimeter and into the cloud, and the user experience is seamless.”

Mike Benson, Chief Information Officer

“Our users never see Skyhigh even though it is a key part of our IT security strategy, allowing us to keep our users and data safe so they can have global access from any device.””

Jeff Haskill, Chief Information Security Officer

“Skyhigh helps us understand how employees use Salesforce to identify insider threats, compromised credentials, and excessive privileged user access.”

Mike Bartholomy, Senior Manager, Information Security

Make Slack your corporate standard

Skyhigh identifies collaboration solutions that employees use in place of the corporate standard, Slack, and provides a risk rating for each service. Using Skyhigh, you can enforce risk-based governance controls and coach users to Slack to improve collaboration while also reducing cost and risk.

Compliance

Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, user groups, and regular expressions with multiple remediation options.

Secure Collaboration

Enforces external sharing policies based on shared links and content and educates users on acceptable collaboration policies.

Next Generation DLP Engine

Provides a native cloud DLP engine designed for DLP, resulting in greater accuracy and fewer false positives/negatives than third-party engines built for search.

Multi-Tier Remediation

Provides multiple options including coach user, notify administrator, block, encrypt, quarantine, tombstone, and delete and enables tiered response based on severity.

Policy Violation Management

Offers a unified interface to review DLP violations, take manual action, and rollback an automatic remediation action to restore a file and its permissions.

Match Highlighting

Displays an excerpt with content that triggered a DLP violation to understand its context. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.

User Coaching

Delivers customizable email and slack notifications to end users in response to policy violations to coach them on appropriate usage.

Pre-Built DLP Templates

Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.

Closed-Loop Policy Enforcement

Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.

Two-Pass Assessment

Optionally performs a first pass DLP assessment in the cloud before downloading potential violations to an on-premises DLP system for evaluation and reporting.

Visibility

Shadow IT Discovery

Identifies any shadow IT cloud services employees are using in place of the corporate standard, Slack.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Slack and enforces granular policies such as read-only access.

Usage Analytics

Identifies all users and groups accessing Slack and reveals which users are accessing sensitive data.

User Groups

Discovers and groups users from Active Directory and Slack. User groups can be leveraged for analytics and policy enforcement.

Threat Protection

Slack SOC

Delivers a threat protection dashboard and incident-response workflow for potential insider threats, privileged user threats, and compromised accounts.

Threat Modelling

Correlates multiple anomalous events within Slack or across Slack and other cloud services to accurately separate true threats from simple anomalies.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.

Account Compromise Analytics

Analyzes login attempts to identify impossible cross-region access, brute- force attacks, and untrusted locations indicative of compromised accounts.

Privileged User Analytics

Identifies excessive user permissions, zombie administrator accounts, inappropriate access to data, and unwarranted escalation of privileges and user provisioning.

Configurable Sensitivity

Provides an adjustable sensitivity scale for each anomaly type with real-time preview showing the impact of a change on anomalies detected by the system.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.

Data Security

Contextual Access Control

Enables on-premises and mobile access control policies based on user groups, device, activity, and geography with coarse blocking and granular view, edit, and download permissions.

Contextual Authentication

Forces additional authentication steps in real-time via integration with identity management solutions based on pre-defined access control policies.

Unmanaged Device Control

Enforces distinct access policies for managed and unmanaged devices by integrating with EMM/MDM solutions and registering and fingerprinting unmanaged devices.

Unstructured Data Encryption

Encrypts files and Slack posts using enterprise-controlled encryption keys and enables transparent end-user access to encrypted data.

Platform

Persona-Based Navigation

Provides a streamlined user interface and embedded workflows for four distinct personas: governance, compliance, security, and executive.

Role-Based Access Control

Delivers pre-defined roles with granular and customizable permissions to manage the data and product capabilities users can access within Skyhigh.

Enterprise Connector

Collects logs from firewalls, proxies, and SIEMs, integrates with directory services via LDAP, and tokenizes sensitive data before uploading to the cloud.

Privacy Guard

Leverages an irreversible one-way process to tokenize user identifying information on premises and obfuscate enterprise identity.

Integration with On-Premises DLP

Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, Intel McAfee, and Forcepoint.

Integration with SIEMs

Combines Skyhigh anomaly and event data with events from other systems and leverages your existing incident remediation process.

Integration with Key Management Systems

Seamlessly integrates with your existing key management systems using KMIP to broker the transfer of enterprise encryption keys to Salesforce.

Integration with IDM

Leverages identity management (IDM) solutions for pervasive and seamless traffic steering through Skyhigh’s proxy and contextual authentication.

Integration with EMM/MDM

Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM certificates.

Total Coverage Architecture

Leverages log collection, forward proxy chaining, packet capture, API, and reverse proxy deployment modes to support all cloud access scenarios.

Skyhigh is the #1 CASB

http://Skyhigh%20#1%20Wreath
Breadth of Functionality

Only CASB to provide DLP, threat protection, access control, and structured data encryption.

http://Skyhigh%20#1%20Wreath
Breadth of Coverage

Only CASB to cover all users across all devices and support all cloud services, including custom apps on IaaS.

http://Skyhigh%20#1%20Wreath
Platform Scalability

Only CASB that scales to support 2 billion cloud transactions per day at the world's largest global enterprises.

http://Skyhigh%20#1%20Wreath
Platform Security

Only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no customer data in our cloud.