Skyhigh Blog

Cloud Security Innovators – Q+A with Jeff Blair, CISO, CAA

July 30th, 2014

We are thrilled to feature a Q+A session with Jeff Blair, CISO of Creative Artists Agency (CAA) in this month’s installment of the Cloud Security Innovators blog series.  Jeff works for CAA, which represents the world’s most biggest athletes and movie stars.  In this fast-paced and creative enviornment, Jeff is a maverick, helping lead the movement to the…

Read More
Tags: | | |

Skyhigh Networks and SafeNet Team Up on Encryption Key Management

July 28th, 2014

More and more organizations have been asking to encrypt their data in business-critical SaaS applications such as Salesforce, ServiceNow, and Microsoft Office 365 with customer-managed keys to ensure compliance and provide additional data protection.  Through integration with SafeNet’s leading key management solutions, Skyhigh now provides a scalable, standards-based solution to meet this request. Enterprises will…

Read More

The 20 Totally Most Popular Cloud Services in Today’s Enterprise

July 26th, 2014

CIOs, CISOs, analysts, journalists, and employees alike are always curious about which cloud services are…like…the most popular and frequently used in the enterprise.  This type of information is useful in that it indicates employee demand for services, divulges potential locations of corporate data in public clouds, and highlights adoption trends. However, obtaining reliable data here…

Read More

Skyhigh and Google Drive for Work

July 23rd, 2014

Google recently announced a new version of its popular file-sharing service, Google Drive for Work, that lets enterprise users securely collaborate in the cloud.   This new offering builds on the success of Google Drive in the consumer world by adding advanced Audit APIs that allow enterprises to use Google Drive while ensuring compliance with internal…

Read More

Has Cloud Adoption Plateaued?

July 17th, 2014

Statisticians are always interested when they see data that diverges from a general pattern.  This is exactly what happened when we dug into the latest cloud usage data from Q2 in the recent Cloud Adoption and Risk Report (CARR). To this point, we had seen rapid growth in the adoption of cloud services.  In Q3,…

Read More

12 Must-Know Statistics on Cloud Usage in the Enterprise

July 9th, 2014

In our professional lives, we all seek to make more data-driven decisions.  We know that logical choices made with complete information yield better results than those based on conjecture or suspicion.  To that end, Skyhigh today released the fifth edition of our quarterly “Cloud Adoption and Risk (CAR) Report” that provides key metrics pertaining to…

Read More

Meeting Privacy, Compliance, & Data Residency Requirements in Salesforce and Applications (Video)

July 1st, 2014

Enterprises keep much of their most valuable data in Salesforce so it’s not surprising that when customers ask us about our solutions for privacy, compliance, and data residency in the cloud, the application they are most frequently interested in is Salesforce. invests in Skyhigh As discussed in our Series C funding blog, recently…

Read More

Thoughts on Our $40M Series C Funding and What it Means to Our Customers, Prospects, and Partners

June 23rd, 2014

I am thrilled to announce our $40M series C round of funding today. It is a significant milestone for the company and stands out for three reasons: The round was co-led by existing investors, Greylock and Sequoia.  Why?  The answer is simple: Skyhigh is capitalizing on its first-mover advantage and extending its marketshare and mindshare…

Read More

Cloud Security Cup: USA vs. Europe (Spoiler – It’s Not a 0-0 Draw)

June 19th, 2014

With the World cup in full swing, one cannot help but compare the US to our neighbors around the world.  The event begs it.  We see our skills, our style, our strategy and our fans all juxtaposed with more established soccer powers from around the globe. And, I have to admit, some things are just…

Read More

TweetDeck — Just another hack or a missed opportunity to tighten cloud security?

June 12th, 2014

The recent TweetDeck hack on Twitter presents a common cloud dilemma for information security teams.  On the one hand, the BYOX trends that drive cloud service adoption and worker self-enablement are transforming traditional IT into a User-Centric IT model that focuses on empowering and enabling workers.  On the other hand, the free-wheeling nature of the cloud and the regular news of breaches…

Read More