Você está na página 1de 2

Named a Cool Vendor by Gartner

The Skyhigh Cloud Access Security Manager enables enterprises to embrace


cloud services with appropriate levels of security and governance, while
lowering overall risk and cost. Skyhigh is the first solution to address the entire
cloud management lifecycle from discovery to analysis to data security.

Skyhigh enables IT, Security, and Compliance teams to


discover, analyze, and secure cloud services.

Gain a comprehensive view into


cloud services in use across the
organization with an objective risk
assessment of each service.

Identify anomalous usage


patterns that may indicate a security
breach, data leakage, or high risk activity.

Enforce security policies across


all cloud services including mobileto-cloud and cloud-to-cloud activity.

Zero footprint, multi-tenant service that enables and


accelerates the secure adoption of cloud services.

Skyhigh allows us to better understand the usage and risks


of cloud services and to put in place usage policies that both
protect the company and work for our employees.

Steve Martino
VP, Information Security

Discover

Log Processor: Collects and


tokenizes logs from firewalls,
web proxies, SIEMs, and log
aggregation products.

Analyze

Secure

CloudAnomaly: Identifies
anomalies in cloud service usage
that are indicative of malware,
malicious use, or high-risk activity.

Contextual Access Control:


Provides the ability to enforce
access control policies based on
user, device and location.

Usage Dashboard: Categorizes


all cloud services, summarizes
usage statistics, and provides
navigation filters.

CloudFlow Encryption:
Applies standards-based 256bit encryption to structured and
unstructured data.

CloudRegistry: Identifies
and classifies thousands of
cloud services including ones
uncategorized by firewalls.
CloudRisk: Assigns an objective
1-10 risk rating for each cloud
service based on data, user/device,
service, business, and legal risk.

CloudAnomaly

Malware Tracking: Identifies known


malware downloaded from cloud
services and provides forensic tracking
capabilities to determine exposure.

CloudFlow Encryption

CloudCompare: Provides
benchmarks for each cloud service
including the percentage of all
companies that use the service.

Application Auditing: Captures


detailed metrics of application
usage including views, updates,
and downloads.

Auto-Alerts: Delivers instantaneous


or scheduled email alerts for service
events, anomalous usage, and
operational events.

CloudDLP: Enforces compliance


policies inline and offline via
alerting, blocking, or encryption to
prevent data loss.

Script Generation: Automatically


generates scripts for popular
firewalls and web proxies to block
selected services.

Allow/Deny Analytics: Presents


detailed statistics on users, data,
and requests allowed and denied
for each cloud service.

Direct-to-Cloud Access: Utilizes a


reverse proxy to secure mobile-tocloud use without requiring a device
agent, VPN, or traffic back-haul.

License Management Dashboard:


Visually summarizes cloud service
usage from a business perspective,
showing usage frequency.

Trending Analytics: Provides a


set of interactive charts to explore
usage over time and pivot across
multiple facets.

Cloud-to-Cloud Control: Enables


consistent enforcement of security
policies as data moves from cloud
service to cloud service.

CloudRisk

Security Dashboard: Provides a


dashboard view from a security
perspective that summarizes highrisk cloud services.

To gain visibility and control over the cloud,


contact Skyhigh Networks today.

Flexible Deployment Options:


Enables the deployment of Skyhigh
Secure in the cloud, on premises
as a virtual appliance, or in a
hybrid architecture.

1.866.727.8383
www.skyhighnetworks.com

Você também pode gostar