Skyhigh enforces granular permissions for activity within cloud services based on contextual factors such as the cloud service, user, device, attempted action, and location in addition to simple coarse-level policies to allow/block access.
“Skyhigh helps us encrypt personally identifiable information in Salesforce using encryption keys we control while preserving searching and sorting functionality.”
“Skyhigh allows us to have more control over data security by adding an additional layer of protection beyond the typical cloud service provider can offer.”
“With Skyhigh we were able to implement cloud security policies without impacting business user productivity.”
“Skyhigh helps us securely enable high-impact cloud services like Office 365 while ensuring data security and compliance with HIPAA and HITECH.”
Skyhigh integrates with digital rights management (DRM) solutions to apply granular file-level permissions such as copy, forward, print, and expiration. Skyhigh can apply rights management protection to files as they are downloaded from cloud services based on the content of the document and context of the activity.
Discovers current cloud application security settings and suggests modifications to improve security based on industry best practices.
Enables on-premises and mobile access control policies based on user, device, activity, and geography with coarse blocking and granular view, edit, and download permissions.
Forces additional authentication steps in real-time via integration with identity management solutions based on pre-defined access control policies.
Enforces distinct access policies for managed and unmanaged devices by integrating with EMM/MDM solutions and registering and fingerprinting unmanaged devices.
Identifies and encrypts existing data found in cloud services and transparently encrypts new data uploaded to the cloud in real time.
Applies standards-based AES or peer-reviewed, function-preserving encryption schemes to structured data using enterprise-controlled encryption keys.
Encrypts unstructured data and leverages advancements in encrypted search indexes to enable end-user search without compromising security.
Preserves end-user functions such as search, sort, and format using academia and peer-reviewed encryption schemes.
Defines a circle of trust for any document and enforces rights management policies through integration with IRM solutions.
Seamlessly integrates with your existing key management systems using KMIP to encrypt data with enterprise-controlled keys.
Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM certificates.
Integrates with identity management (IDM) solutions, enabling pervasive and seamless policy enforcement and contextual authentication.