Skyhigh Ferrets Out 'Shadow' Cloud Service Use on Corporate Networks

1 - Skyhigh Ferrets Out 'Shadow' Cloud Service Use on Corporate Networks
2 - Primary Dashboard Tracks Cloud Services in Use
3 - Service Discovery Rates Potential Risks
4 - Skyhigh Enables Customized Risk Weighting, Control
5 - Skyhigh Monitors Social Media Activity
6 - Skyhigh Ferrets Out Anomalous Trends
7 - Get Detailed Usage Reports on Each User
8 - Get Control of Cloud Service Usage
9 - Skyhigh Uses Aliasing Systems to Explore Network Domains
10 - Upload Security, Access Logs From Devices, Applications
11 - Skyhigh Simplifies Reporting, Decision Making
1 of 11

Skyhigh Ferrets Out 'Shadow' Cloud Service Use on Corporate Networks

by Frank J. Ohlhorst

2 of 11

Primary Dashboard Tracks Cloud Services in Use

The dashboard provides a summary of the all the cloud services in use by the organization, the number of high-risk services, total number of users or IP addresses, and number of high-risk activities.

3 of 11

Service Discovery Rates Potential Risks

Skyhigh rates every service on a 1 to 10 scale, based on 30 attributes across data, user, device, service and business risk categories. Users can also customize weights of the risk categories.

4 of 11

Skyhigh Enables Customized Risk Weighting, Control

Skyhigh provides a risk assessment of all services used by the organization according to high, medium and low levels. It also provides the ability to customize rating weights to match the risk tolerance of a particular organization.

5 of 11

Skyhigh Monitors Social Media Activity

The Skyhigh highlights all users who accessed or were denied access to social media sites. This allows companies to set policies on to what degree they want employees using social media on company time. Some companies and corporate departments encourage social networking as a marketing and public relations tool. Others discourage it as a security risk.

6 of 11

Skyhigh Ferrets Out Anomalous Trends

Skyhigh identifies statistical and behavioral outliers in usage across all cloud services. This allows IT departments to identify possible risky user behavior or even unauthorized access of the corporate networks or cloud services.

7 of 11

Get Detailed Usage Reports on Each User

Skyhigh's User Details view provides a comprehensive analysis of all activity for a particular user, including a list of all services accessed, frequency of access, whether the service was accessed or blocked, and usage anomalies.

8 of 11

Get Control of Cloud Service Usage

Skyhigh enforces key security and usage policies such as access control, data encryption and data loss prevention.

9 of 11

Skyhigh Uses Aliasing Systems to Explore Network Domains

Skyhigh relies on an aliasing system to access a domain, while using the original domain as a platform for access control.

10 of 11

Upload Security, Access Logs From Devices, Applications

With Skyhigh, uploading logs from egress devices such as firewalls, proxy servers or SIEM (security information and even management) systems or log aggregation products is a simple and straightforward process.

11 of 11

Skyhigh Simplifies Reporting, Decision Making

A summary screen gives administrators an up-to-the-minute view of the status of the environment and allows IT managers to quickly make decisions without having to run reports or other analytics.

Top White Papers and Webcasts