Skyhigh Cloud Access -A leading CASB to protect you and your organisation.
February 23, 2018

Skyhigh Cloud Access -A leading CASB to protect you and your organisation.

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Skyhigh Cloud Access Security Broker

Skyhigh is used by the data security team, where it helps us by noting the services browsed by the users in the organization. It not only shows the services but also marks the high-risk services with appropriate reasons. This helps us block those services in our organization from external attacks.
  • It helps in identifying high risk services and also shows the reasons for its rating as high and also the user activity on that service like amount data uploaded/downloaded which helps us in easily tracking the bad services and blocking them in our organisation
  • It has a great User interface. Skyhigh has a great feature called Detokenization where only a user with a high level of authenticity can decrypt the tokenized user data in the UI. This is really a promising feature for customers: they like that they need not worry about our data since the entire thing is being encrypted
  • It helps in integrating cloud tools like office 365 ,box ,salesforce etc.Where for every abnormal activity there will be anomaly created and alerts customers that there is some suspicious thing is happening and notifies us to investigate
  • Skyhigh support should be improved a bit in pleasing customer needs during calls for any issue
  • Skyhigh need to reflect data from the integrated tools like office 365 /sales force without any time gap as most of the time it reflects data almost after 24 hrs where a customer may potentially be delayed in remediating to an incident
  • There should be email alerting system must be implemented in Skyhigh for every anomaly triggered.
  • Notifying us about bad services and abnormal activities performed by user in the cloud drives
  • if I have to say negative impact that is a reflection of logs from cloud drives to Skyhigh is slow, where we will be losing huge time for remediation/containment of the issue
  • Microsoft cloud app security
Skyhigh is one of the leading CASB on the market because it has a cool User interface where it is easy for a normal user who cannot read raw logs to easily understand the issue by the UI and perform remediation steps. The way it provides security to customer data is exceptional, like the detokenization feature which is a promising one and really delights customers so they won't worry about their data.
Skyhigh is best suited for notifying us of the bad services which are being run in the organization. It really reduces the time it takes for in-depth analysis of proxy logs. It is also helpful for notifying us of any abnormal activities performed by the users in the cloud apps. For example, if a user has left the company and then there was a huge amount of files downloaded from his drive, we may not have known. Here, Skyhigh helps by notifying us of anomaly-like data (high amounts of download and upload activities performed). This is one of the best scenarios I can say, where we see what actually is happening in the cloud drives for the organization. It also helps by notifying if there is any service or activity performed against any sort of compliance with its own mechanisms.

Using Skyhigh Cloud Access Security Broker

50 - They all represent an information and infrastructure security team.
20 - People should have understanding on proxy logs and cloud apps
  • Detokenization
  • High risk services
  • DLP policies and Anomalies
  • Creating a rule for anomalies to trigger some special incidents
  • Identifying high risk services
  • In creating customized DLP policies and triggering anomalies on those policies
  • Performing a on demand scan on the apps integrated with the skyhigh
Skyhigh is a leading CASB helps in identifying the bad services and protecting user data with a detokenization feature and also with the anomalies triggering alarms to customers for any suspicious activities. It provides users by providing blocking script to block service on the proxy or firewall and also shows the abilities to the user to balance the weight of risk service.