apacciooutlook logo

Skyhigh Cloud Security Labs Enhances Cloud Protection

Tuesday, March 1, 2016

content-image

CAMPBELL, CA: Skyhigh Networks, a provider of cloud security, announces the inclusion of Cloud Threat Intelligence to its Cloud Security Labs (CSL) which investigates suspicious activity and alerts the user.

Skyhigh CSL includes technologies such as its Cloud Service Intelligence and Cryptography Research. CSL has now introduced Cloud Threat Intelligence to provide even greater insight into the growing cloud threat landscape.

Cloud Threat Intelligence

Skyhigh CSL researches activity from its global user base across the world to investigate patterns of usage that compromise the security of corporate information. One of Skyhigh CSL’s technologies to detect botnet behavior was created by CSL, by creating an algorithm that uses multi-dimensional probabilistic weighting to percolate domains that display characteristics of a Command & Control server. CSL achieves this by using classical signal processing techniques that can characterize abnormally programmatic behaviors, providing customers with detailed forensics to pinpoint and remediate exact systems that have been compromised.

CSL has also developed capabilities to visualize out bound data flows to non-cloud service IPs and domains and analyzes the traffic by characteristics such as IP reputation and geography, enabling companies to identify outbound data flows and prevent data exfiltration.

Skyhigh CSL leverages a user base of 23 million users to create robust behavioral models to fingerprint each cloud service.  Using these behavioral models in conjunction with additional threat intelligence feeds, Skyhigh detects abnormal activity with a high-degree of accuracy and proactively alerts customers to activities requiring attention.

Cloud Service Intelligence

Skyhigh CSL researches cloud services to provide customers with a comprehensive view of the state of cloud services available in the global market and insight into the risks of each of these cloud services. Skyhigh CSL also offers real-time continuous identifying and evaluation of cloud services.

Skyhigh CSL extends the depth of intelligence via its integration with darknet and other sources of cyber-risk intelligence while extending the breadth of risk visibility into the B2B partner ecosystem. Skyhigh CSL also audits over 17,000 cloud services when a major vulnerability, such as Heartbleed, VENOM, FREAK, POODLE, or BASH, is exposed, determines the security implications using advanced data mining and natural language processing, proactively informs customers of cloud service risks, and provides recommendations for remediation.

Cryptography Research and Development

Skyhigh CSL works with five leading cryptography academics from Cornell Tech, University of London, Georgia Tech, and University of California and San Diego creating the formation of the Skyhigh Cryptography Advisory Board. With synchronization between the Cryptography Advisory Board and Skyhigh CSL, Skyhigh CSL has developed advancements in cloud cryptography such as searchable symmetric encryption, order-preserving encryption, and format-preserving encryption.

Leaders Speak

Andy Nallappan, VP & CIO,

The Industry Demands Quick Upgrade into Cloud

By Andy Nallappan, VP & CIO,

Global Information Technology, Avago Technologies

Steven Weinreb, CIO & EVP, Technology & Operations, Asia, MetLife

Embracing Advanced Tech-enabled Solutions that Foster Innovation and Growth

By Steven Weinreb, CIO & EVP, Technology & Operations, Asia, MetLife

Anil Khatri,

Trends that are on Every CIO's Watch-list

By Anil Khatri,

Head IT-South Asia,

SAP

James F. Hanauer, CTO, VP Engineering and Art Saisuphaluck, Solutions Architect, R&D Lead, CTSI-Global

Simplifying Infrastructure Management with Microsoft Solutions

By James F. Hanauer, CTO, VP Engineering and Art Saisuphaluck, Solutions Architect, R&D Lead, CTSI-Global

Mickey Bradford, VP-IT/CTO, Exchange; & Jay McCartin, VP-Logistic Operations,  Army & Air Force Exchange Service

Embracing Cloud Hosting Benefits

By Mickey Bradford, VP-IT/CTO, Exchange; & Jay McCartin, VP-Logistic Operations, Army & Air Force Exchange Service

Featured Vendors