A cloud security solution is a critical component of your IT infrastructure. It controls how employees, contractors, partners and customers gain access to cloud services.
Skyhigh is designed from the ground up to help you meet your security and compliance needs and also be the enterprise grade service you can trust.
Skyhigh has invested heavily to provide an enterprise grade service. Those investments include:
1. ISO 27001 certification
One of the most robust certifications a cloud provider can attain is ISO 27001 certification. Attaining ISO certification is a reflection of our commitment to security across multiple functions. We’re proud to be the first cloud access security broker to attain certification and join the 4% of cloud providers who have gone through this extensive validation process.
2. FedRAMP Compliance
Considered as one of the most stringent security assessment, Skyhigh is the first and only Cloud Access Security Broker (CASB) to achieve FedRAMP compliance. As part of the accreditation process, a Third Party Accreditation Organization (3PAO) assessed Skyhigh across a range of controls and categorized us as a moderate impact-level service.
3. Transparency of controls and compliance
We Self-Certify Compliance with:
3. Operations and Data
Skyhigh Networks Operations partners with trusted industry leaders like Equinix and XO communications to provide a secure, performant, highly available infrastructure. Access to infrastructure is closely controlled and limited to trusted senior team members. Two-factor authentication and IPSec VPNs ensure strong authentication and encryption of data.
4. Security expertise & oversight
Our service was built by a team with a proven track record in enterprise security. Prior to founding Skyhigh Networks, the team was responsible at Cisco for products that enable customers to administer, enforce, and audit standards-based, consistent access policies across the IT stack. The team delivered the Identity Services Engine, a product that won the coveted Pioneer Award in Cisco and is considered to be a game changer for Cisco.
5. Independent Penetration & vulnerability testing
While we audit ourselves continually, we remember Richard Feynman’s principle: “you must not fool yourself, and you are the easiest person to fool.” Accordingly, major software releases are heavily audited by a 3rd party (Data Theorem), at least twice a year.