KuppingerCole Report
Executive View
By Mike Small

Skyhigh Cloud Security Platform

Many organizations are using cloud services but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use of the cloud, to control which cloud services can be accessed and to protect the data held in these services. Skyhigh Cloud Security Platform provides a valuable tool that organizations can use to improve governance over their use of cloud services.
By
sm@kuppingercole.com

1 Introduction

The easy availability of cloud services together with the revolution in the range of devices that can be used to access these services has created cha ...

Login Free 30-day Select Access Get full Access

2 Product Description

Skyhigh Networks has its headquarters in Campbell, Calif., the company is backed by Greylock Partners, Sequoia, and Salesforce.com. The Skyhigh Cloud ...

Login Free 30-day Select Access Get full Access

2.1 Skyhigh Cloud Solutions

Skyhigh Cloud Security Platform covers a wide range of cloud service. There are specific Skyhigh product solutions for:

  • Skyhigh for Shadow IT
  • S ...
Login Free 30-day Select Access Get full Access

2.2 Detect Cloud Service Usage

Skyhigh’s visibility solution evaluates logs collected from network appliances or SIEMs to deliver an overview of an organization’s cloud usage an ...

Login Free 30-day Select Access Get full Access

2.3 Protect against Cyber Risks

Skyhigh uses several techniques to manage risk in traffic to and from cloud services. These include proxy chaining, forward and reverse proxy to inte ...

Login Free 30-day Select Access Get full Access

2.4 Data Security

Skyhigh’s data security solution adds layers of protection for sensitive data over and above those provided by a typical cloud service. It enables ...

Login Free 30-day Select Access Get full Access

2.5 Compliance

Skyhigh’s compliance solution provides a unified DLP policy engine, incident reporting, and remediation workflow for all cloud services. Skyhigh can ...

Login Free 30-day Select Access Get full Access

2.6 Identifying and Controlling User Access

To discover and control access to cloud services it is important to be able to correctly identify the users of these services. Many organizations use ...

Login Free 30-day Select Access Get full Access

3 Strengths and Challenges

Cloud services are outside the direct control of the customer organization and their use places the control of the service and infrastructure in the h ...

Login Free 30-day Select Access Get full Access

Copyright

©2020 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top