Skyhigh Blog

Cisco’s Path to Secure Cloud Enablement

August 29th, 2014

With a seemingly nonstop feed of menacing headlines announcing corporate data breaches, it is becoming impossible for IT departments to maintain a “head in the sand” attitude towards security vulnerabilities. “If you are the head of security, the first thing you’ve got to realize is that the bad news is not going to get better,”…

Read More

The Rapidly Emerging Security Market Called Cloud Access Security Broker (CASB), Cloud Application Control (CAC), and…

August 26th, 2014

When the founders of Skyhigh Networks started the company in 2012, they knew they were bringing to market an important service that would fill a major need for companies of all sizes. What they didn’t know at the time is that Skyhigh would be creating a new market category that Gartner would name the #1…

Read More

The Fastest Growing Cloud Apps of 2014

August 25th, 2014

The cloud is growing exponentially and SaaS provider revenue in 2014 is set to surpass $18 billion, making the cloud application market larger than previous major shifts in technology at key points in their development including e-commerce revenue in 1998 ($8 billion) and personal computer revenue in 1982 ($11 billion). It’s easier today for entrepreneurs…

Read More

Rise of the (Malware) Machines

August 22nd, 2014

Take any movie where robots rise up against their human makers, and you’ll see fear and panic set in.  This happens in films such as The Terminator (1984), Screamers (1995), and I, Robot (2004).  Why?  Because robots operate on autopilot and are not constrained by human limitations: the need for food, water, or sleep.  This…

Read More
Tags: | |

DIRECTV’s User-Centric Cloud Security Model (Video)

August 21st, 2014

Today’s employees are used to cloud services that make them more productive and efficient, and because they use many intuitive cloud services in their personal lives, they expect the same convenience in the office.  At DIRECTV, enabling employees to access the cloud services and data they want, when they want, where they want, and from…

Read More

Only 1 in 100 Cloud Providers Meet Proposed EU Data Protection Requirements

August 11th, 2014

Whether your organization is based in Europe, has operations in Europe, or handles data pertaining to EU residents, a proposed EU regulation in the works will have a significant impact on which cloud services you use and how you use them. The EU General Data Protection Regulation is expected to be passed this year and…

Read More

The Great Russian Hacker Heist & the “Shadow ID” Problem it Exposed

August 8th, 2014

On Monday the world learned that a small crew of Russian hackers stole 1.2 billion internet passwords.  Before digging into what this means to your enterprise’s information security posture, I must first commend Nicole Perloth and David Gelles from the New York Times for their excellent journalism in breaking this important story.  Their full article…

Read More

Cloud Security Innovators – Q+A with Jeff Blair, CISO, CAA

July 30th, 2014

We are thrilled to feature a Q+A session with Jeff Blair, CISO of Creative Artists Agency (CAA) in this month’s installment of the Cloud Security Innovators blog series.  Jeff works for CAA, which represents the world’s most biggest athletes and movie stars.  In this fast-paced and creative enviornment, Jeff is a maverick, helping lead the movement to the…

Read More
Tags: | | |

Skyhigh Networks and SafeNet Team Up on Encryption Key Management

July 28th, 2014

More and more organizations have been asking to encrypt their data in business-critical SaaS applications such as Salesforce, ServiceNow, and Microsoft Office 365 with customer-managed keys to ensure compliance and provide additional data protection.  Through integration with SafeNet’s leading key management solutions, Skyhigh now provides a scalable, standards-based solution to meet this request. Enterprises will…

Read More

The 20 Totally Most Popular Cloud Services in Today’s Enterprise

July 26th, 2014

CIOs, CISOs, analysts, journalists, and employees alike are always curious about which cloud services are…like…the most popular and frequently used in the enterprise.  This type of information is useful in that it indicates employee demand for services, divulges potential locations of corporate data in public clouds, and highlights adoption trends. However, obtaining reliable data here…

Read More