CUPERTINO, CA–(Marketwire – Feb 25, 2013) – Skyhigh Networks, the cloud visibility and control company, today at the RSA Conference announced general availability of the first solution that allows enterprises to know exactly which cloud services their employees use and the risks those services may pose. The Skyhigh Networks Cloud Services Manager gives enterprises total control over access to cloud services and over the data being shared with cloud services from mobile devices or from the corporate network. Customers of Skyhigh Networks include Cisco, Equinix, General Electric, Torrance Memorial Medical Center, and several other Fortune 500 companies.
Nominated as a finalist for the RSA Conference 2013 Most Innovative Company, Skyhigh Networks will showcase its new platform and capabilities February 25 – 28th, at booth #147.
Skyhigh gives CSOs and CIOs a powerful and easy-to-use, cloud-based, multi-tenant service to discover, analyze, and control employee use of over 2,000 cloud services in over 30 categories such as storage and collaboration (e.g., Box.com), productivity (e.g., Microsoft Office 365), source code versioning (e.g., GitHub), and CRM (e.g., Salesforce.com). Market research firm Gartner classifies Skyhigh Networks as a “Cloud Access Security Broker.”
“As organizations increase their use of cloud-based services, security risks are being overlooked or fragmented with siloed and disparate security policies,” according to Gartner. “Cloud Access Security Brokers will help organizations provide consistent, audited, compliant security policy enforcement as cloud-based services and enterprise information assets are accessed from managed and unmanaged devices.”*
In minutes, the Skyhigh service discovers all cloud services being accessed and provides detailed ratings on the potential risks to the enterprise presented by each service. These detailed ratings are based on an objective weighted assessment of more than 30 security and legal risk factors.
Leveraging a proprietary processing engine powered by Hadoop, the Skyhigh service analyzes all cloud service usage and detects anomalies that may indicate potentially harmful use or information leakage. It compares actual use of services with paid subscriptions, enabling organizations to slash their costs and eliminate unwanted or redundant services.
“With Skyhigh we immediately discovered a wide range of services that we had not authorized,” said Steve Martino, vice president, Information Security, at Cisco. “Skyhigh allows us to better understand the risks these services present and to put in place usage policies that both protect the company and work for our employees.”
With a powerful, scalable platform and a simple dashboard, Skyhigh puts IT administrators just three clicks away from controlling the access to and encrypting the data bound for specific cloud services so employees can safely use those services at work, at home, or on the road from any mobile device — all without requiring an agent on the device or affecting the user experience.
“We need a solution that helps wrap cloud services with the security, compliance, and governance we need, but without any friction for the business or the providers,” said Brian Lillie, CIO of Equinix, a global data center company. “Skyhigh Networks addresses these needs and enables me to become the Chief Enabler to the business.”
Skyhigh capabilities include:
- Discovery: Log-based discovery and objective, customizable risk assessment of all cloud services in use by employees;
- Analysis: User, service, device, and data behavioral modeling and anomaly detection, utilization, benchmarking, and trending of all cloud service use;
- Control: three-click intermediation of selected cloud services for access control and encryption of data with enterprise-owned keys.
Skyhigh allows customers to:
- Discover their enterprise cloud exposure through complete visibility into the use and risk of all IaaS, PaaS, and SaaS cloud services used by employees;
- Isolate potential data leaks, security breaches, and regulatory and internal policy non-compliance from the specific use of cloud services;
- Identify cloud services which should be approved, controlled, consolidated, or subscriptions reduced based on actual usage and industry best practices;
- Gain full confidence that their confidential data stored in cloud services will not be compromised;
- Access approved cloud services from mobile devices with full control without requiring a device agent, VPN, or traffic back-haul.
“For the first time, enterprises can take advantage of the cloud without treating it as a threat and having it become Shadow IT,” said Rajiv Gupta, CEO and co-founder of Skyhigh Networks. “We give enterprise IT organizations immediate visibility, insight, and control so that they can enable cloud service adoption without friction to the employee or the provider.”
“The growing adoption of cloud services is creating new challenges in IT governance and security,” said Asheem Chandna, partner at Greylock Partners and Skyhigh Networks board member. “Rajiv and his team have a strong record of delivering ground-breaking products. Skyhigh Networks allows application owners and enterprise IT to fully embrace the cloud while retaining visibility and control — whether employees connect via mobile or from the corporate network.”
*Gartner, Inc., The Growing Importance of Cloud Access Security Brokers, Neil MacDonald, Peter Firstbrook, May 30, 2012.
Availability and Free Trial Offer
Embrace the cloud with visibility and control at your company today. For a free trial of Skyhigh Networks, please register at: www.skyhighnetworks.com.