Skyhigh Security
DATA-AWARE CLOUD SECURITY
Skyhigh Security offers a data-centric approach to security so organisations can protect their data wherever it is stored, moved or used. Focusing on data is at the centre of everything we do and with the unified data policy for multiple security controls and an easy-to-use, single platform, Skyhigh Security has built a comprehensive Security Service Edge (SSE) portfolio including Secure Web Gateway (SWG), Cloud Access Security Broker ( CASB), Zero Trust Network Access (ZTNA)/Private Access, Data Loss Prevention (DLP), Cloud Firewall and Cloud Native Application Protection Platform (CNAPP).
Building on the lineage of McAfee Enterprise and Skyhigh Networks, Skyhigh Security and its 700+ employees are committed to creating the best solutions available.
VPN / SSL / ZTNA
A conventional VPN is a virtual, self-contained communication network that uses an existing communication network as a transport medium. It is used to connect participants in the existing communication network with another network. In addition to traditional networking via VPN gateways, SSL VPN is also increasingly being used to connect individual end devices. With ZTNA administrators can granularly control access to internal resources and restrict access based on the client’s health state.
Data Loss Prevention (DLP)
“Data loss prevention” and “data leakage prevention” are usually used synonymously, but some specialists also differentiate between them in technical discussions: “Data loss prevention” is protection against the unwanted outflow of data that causes damage and is also noticed, while “data leakage prevention” stands for protection against the suspected but unmeasurable and sometimes undetectable passing on of information to unwanted recipients.
Cloud Access Security Broker (CASB)
Cloud apps should be accessible as flexibly and easily as possible, preferably from any location with internet access and from any end device. However, it is precisely this simplicity of cloud access that often makes it easy for unauthorised third parties to access cloud data and misuse cloud apps. Among other things, cloud access security brokers ensure that network traffic between on-site devices and the cloud provider only takes place in accordance with the organisation’s predefined rules and policies. They are also useful because they provide insight into the use of cloud applications across multiple cloud platforms and can therefore recognise unintended use.


