What are you looking for ?
Infinidat
Articles_top

Skyhigh Networks Secure Cloud Data

256-bit encryption and contextual restriction

Skyhigh
Networks Inc.
announced the availability of Skyhigh Secure, a
solution that enables organizations to address their cloud data protection
requirements – including contextual access control, application auditing, encryption,
data loss prevention, and cloud to cloud access control
.

Data security continues to be the most
significant barrier to cloud adoption. According to the PwC report titled The
Future of IT Outsourcing and Cloud Computing
, 62% of respondents rated data
security as a ‘serious’ or ‘extremely serious’ risk.

This service allows IT and
information security teams to proactively protect data in the cloud without
altering the end-user experience.

"Like
most enterprises, we needed a complete solution that allowed us to discover
what cloud services were in use and leverage big data analytics to assess risks
of corporate data moving to and from these cloud services,
" said Brian
Lillie, CIO, Equinix, Inc. "With Skyhigh
Secure, we have the intelligence around risks to our organization and we are
able to protect corporate data without impacting business user productivity.
"



It offers advantages:

  • First, the mobile to
    cloud capabilities enable access of cloud services from mobile devices without
    the need for agents, downloads, or other footprints on the device, and without
    the need for VPN or backhaul of mobile traffic through the enterprise network.
  • Second, it provides proactive and adaptive security that leverages real-time
    application and usage analytics to detect threats and secure data to and from
    cloud services.
  • Third, it delivers three-click configuration and flexibility of
    deployment with cloud, on-premise, and hybrid delivery options.

"The
cloud should be viewed as an asset and not as a threat, but organizations are
slow to fully adopt cloud services because of concerns around the security of
their data,
" said Rajiv Gupta, CEO, Skyhigh Networks. "With Skyhigh Secure, we are effectively
providing our customers with a virtual ‘cloud edge’ that consistently and
transparently enforces their security, privacy, and regulatory policies on
their corporate data stored in cloud services.
"

The company delivers the following
features:

  • Contextual
    Access Control
    : Allows or denies access to
    corporate data in the cloud based on user, device, and geographic location.
  • Application
    Auditing
    : Granular auditing of application usage and
    real-time identification and alerting of anomalous use.
  • Encryption: Industry standards-based 256-bit encryption for structured and
    unstructured data that maintains sorting, searching, and other end-user
    functionalities.
  • CloudDLP: Inline and offline DLP for cloud data including alerting,
    encrypting, and blocking actions and integration with existing on-premise DLP
    solutions.
  • Cloud-to-Cloud
    Control
    : Enforcement of corporate policies as data
    moves from mobile to cloud, on-premise to cloud and even from cloud to cloud.

The company supports cloud services across
all major categories, including cloud storage and collaboration (e.g., Box),
social business platforms (e.g., Jive), customer relationship management (e.g.,
Salesforce), productivity suites (e.g., Office 365), human resources and
finance (e.g., Workday) and IT service management (e.g., ServiceNow).

"Security,
visibility and control are crucial considerations for any organization moving
core services to the cloud,
" said Justin Somaini, chief trust officer,
Box. "By working with cloud security
innovators like Skyhigh Networks, we can provide our customers with a simple,
powerful way to govern content sharing and collaboration, giving more people
access to the usability and functionality that sets Box apart from other cloud
content solutions.
"

The cloud access security manager is a solution
that addresses the entire cloud adoption lifecycle from discovery of cloud
services, to objective risk assessment of all cloud services, to analysis of
anomalous use, to protection of corporate data in the cloud.

Articles_bottom
AIC
ATTO
OPEN-E