Skyhigh Security

sky high security

Skyhigh CASB (formerly McAfee MVISION Cloud)

Solutions provided by Skyhigh CASB

Shadow IT Countermeasures: Skyhigh CASB for Shadow IT

"Skyhigh CASB" provided by Skyhigh Security realizes cloud visualization and control from two approaches: shadow IT measures and Sanctioned IT measures. Even companies that have been hesitant to introduce cloud services due to concerns about cloud security can now use the cloud with peace of mind.

  • Shadow IT countermeasures
    Based on the access log of Proxy/FireWall, we match with Skyhigh CASB's cloud risk DB to visualize cloud access and perform risk assessment.
  • Sanctioned IT measures
    Acquire the logs of regular cloud services with API and visualize the usage status. You can define common policies across multiple cloud services, and control uploading of confidential information to cloud services and external file sharing.

The role of each license of Skyhigh CASB

  Shadow IT Countermeasures: Skyhigh CASB for Shadow IT Sanctioned IT measures: Skyhigh CASB for SaaS

definition

Cloud services that employees use without realizing it
*Including safe/dangerous services
Cloud services contracted and used as a company
*Confirmed safety

Task

The administrator cannot grasp the usage status of the cloud service The default administrative functions of the service are not secure enough

Response by CASB

Visualization

  • Continuous understanding of cloud service usage status from access logs
  • Who is accessing the cloud at what risk and how much
  • Enhanced log audit function
  • Anomaly detection
  • Know your files in the cloud

control

  • Formulation of cloud service usage standards
  • Restrict communication that does not meet usage standards
  • Recommendations for users
  • File deletion, quarantine, sharing restrictions, etc. Policy enforcement

For Shadow IT

What is Shadow IT

  • Shadow IT refers to cloud applications that are used by employees without permission from the company.
  • Enterprises use more cloud services than IT admins realize
What is Shadow IT

Risks of not knowing shadow IT

Information leak from domestic cloud storage

Risks of not knowing shadow IT
problem
  • I didn't understand the security of the service (data was stored unencrypted)
  • Didn't realize employees were using cloud storage services for business
problem

Configuration image of Skyhigh CASB for Shadow IT

Configuration image of Skyhigh CASB for Shadow IT

Determine the risk of cloud services based on CSA

  • Cloud service risks are quantified using approximately 50 items based on CSA (Cloud Security Alliance) guidelines
Determine the risk of cloud services based on CSA

Reduces man-hours for responding to questionnaires and confirming agreements related to cloud service risk assessment

Skyhigh CASB risk judgment screen

Skyhigh CASB risk judgment screen

Evaluate similar cloud services side by side

  • View risk assessment items for each service side by side
Evaluate similar cloud services side by side

You can use it to consider introducing services to your company and to guide users who have applied for use of alternative services.

For Sanctioned IT

Sanctioned IT and risk

  • What is Sanctioned IT IT?
    Cloud services contracted and used by companies, authorized cloud services (Microsoft 365, box, Slack, etc.)
    Safe as a service, but not all security is guaranteed by the service provider
    The following risks must be addressed by the user
User abuse User abuse

User abuse

account takeover account takeover

account takeover

Data sharing with external parties Data sharing with external parties

Data sharing with external parties

Shared Responsibility Model and CASB (Sanctioned IT) Visibility and Control Range

Shared Responsibility Model and CASB (Sanctioned IT) Visibility and Control Range

Support for IaaS

  • Check logs and configuration information using API to detect account compromise and vulnerable settings
Support for IaaS

Skyhigh CASB makes API calls directly to the target SaaS and visualizes the sharing status of user activity files.
No network changes or agent installation required.

Feature 1: Activity Monitoring

  • Collect logs via API and detect suspicious events using machine learning
Feature 1: Activity Monitoring

Feature 2: UEBA

  • Detect unusual and suspicious events as anomalies and classify their severities
Feature 2: UEBA

Feature 3: Collaboration Control

  • Visibility of internal and external collaborators within the managed tenant
  • Analysis of external collaborators' access to critical information
Feature 3: Collaboration Control

license

License lineup list

License type Billing target
Skyhigh CASB for Shadow IT - Number of Employees
SaaS Unlimited Supported SaaS Unlimited Number of SaaS contract users
Microsoft365 Onedrive/Sharepoint
Mail
Teams
Mail/Onedrive/Sharepoint
Shadow IT/Mail/Onedrive/Sharepoint
Mail/Onedrive/Sharepoint/Teams
Shadow IT/Mail/Onedrive/Sharepoint/Teams
BOX -
Dropbox -
SLACK -
Google drive
Mail
Salesforce Sales Cloud
Service Cloud
  • Shadow IT
    • The log retention period on the GUI is 1 year.
  • Sanctioned IT
    • The standard log retention period on the GUI is 100 days.
      As an option, it is possible to extend the storage period to 1 year (365 days) for each regular price license + 10% fee.

remarks

  • Only major services are listed for Sanctioned IT licenses. Please inquire about each optional license separately.
  • Please inquire separately about other supported services.

Inquiry/Document request

In charge of Macnica Skyhigh Security

Mon-Fri 8:45-17:30