McAfee Skyhigh Security Cloud - Cloud Access Security Broker

One platform for all cloud servicesSkyhigh Logo

BSI partner with McAfee to provide a Cloud Access Security Broker (CASB) solution to our clients. We partner with market leading providers to complement our offering. McAfee Skyhigh Security Cloud is a Gartner and Forrester solution trusted by enterprises to protect their data in thousands of cloud services.With McAfee Skyhigh Security Cloud, organizations can leverage a single cross-cloud platform to gain visibility into cloud usage and risks, meet compliance requirements, enforce security policies, and detect and respond to potential threats.



McAfee Skyhigh Security Cloud provides a single point of control for all cloud apps - all users - all devices

Skyhigh Architecture

Visibility

McAfee Skyhigh Security Cloud continuously discovers cloud service usage. With the world’s largest and most accurate Cloud Registry, clients know they have a complete view into all cloud services in use, including thousands of services uncategorized by firewalls and web proxies.

McAfee Skyhigh Security Cloud enables enterprise-grade services in demand that can be enabled, as well as redundant services that can be consolidated to reduce cost and improve collaboration, and high-risk services that should be avoided.

  • Cloud registry
  • Cloud trust ratings
  • Cloud usage analytics
  • Cloud service governance
  • Cloud enforcement gap analysis
  • Coaching and enforcement
  • Customizable views and reporting
  • Activity drilldown
  • On-demand data scan
  • Collaboration analytics

 

Threat protection

McAfee Skyhigh Security Cloud analyzes cloud activity across multiple heuristics, to develop an accurate and continuously updated model of user behaviour that detects negligent and malicious user activity and takes real-time action to prevent data loss.

  • Cloud security operations centre (SOC)
  • Threat modelling
  • User behaviour analytics
  • Account access analytics
  • Privileged user analytics
  • Configurable sensitivity
  • Cloud activity monitoring
  • Data exfiltration analytics
  • Darknet intelligence
  • Outbound data intelligence

Compliance

Identify sensitive data in motion or at rest in cloud services and enforce data loss prevention (DLP) policies to comply with industry regulations and internal policies.

  • Cloud data loss prevention
  • Multimode DLP
  • Next generation DLP engine
  • Multi-tier remediation
  • Policy violation management
  • Match highlighting
  • Email coaching
  • Secure collaboration
  • Pre-built DLP templates
  • Closed-loop policy enforcement
  • Two-pass assessment

Data security

Enforce data-centric security policies including encryption with your own keys, contextual access control and information rights management.

  • Security configuration audit
  • Contextual access control
  • Contextual authentication
  • Unmanaged device control
  • Multimode encryption
  • Structured data encryption
  • Searchable symmetric encryption
  • Information rights management