Skyhigh Networks and Check Point Software Technologies have formed a partnership to seamlessly extend security, compliance, and governance policies to SaaS, PaaS, and IaaS services. The integration allows mutual customers to leverage Skyhigh’s CASB platform and Check Point’s next generation firewall to proactively enable the use of cloud services while enforcing internal policies, complying with external regulations, and protecting corporate data. “Cloud is a reality of the modern workplace and our customers want to ensure cloud use complies with their strictest security policies and regulatory requirements,” said Alon Kantor, vice president of business development at Check Point. “This partnership brings together the leading CASB provider with the leading next generation firewall and threat prevention provider to deliver the best of both worlds: the cloud user experience employees want and the cloud security controls IT needs.”
Cloud usage is at an all time high. According to the Q4 2015 Skyhigh Cloud Adoption and Risk Report, the average company uses 1,154 cloud services and uploads over 5.6 TB to file sharing services each month. Companies lose visibility and control over this vast migration of data to the cloud creating a cloud security gap. Skyhigh’s partnership with Check Point addresses this gap and enables companies to confidently embrace cloud services without compromising their security requirements. Skyhigh and Check Point allow companies to leverage and extend their existing investments to the cloud versus an expensive and time consuming ‘rip and replace’ approach. Specifically, the combined solution allows companies to:
- Provide visibility into cloud services in use, based on a registry of over 17,000 services, as well as a comprehensive risk assessment of each cloud service based on 50+ attributes
- Enable compliance by enforcing Data Loss Prevention (DLP) policies on data moving to the cloud
- Protect company data by enforcing granular, contextual policies to allow, block, or provide read-only or limited access to selected cloud services
- Consolidate usage to company approved cloud services by guiding users with just-in-time coaching messages
- Identify data uploads to risky cloud services or data downloads from cloud services that are known to harbor malware
- Protect against data exfiltration attempts by applying threat intelligence to analyse cloud traffic patterns, detect anomalous behavior, and remediate against users or cloud services
“Companies want to embrace cloud services, but they can’t leave behind security controls as corporate data moves off-premises,” said Chris Cesio, vice president of business development at Skyhigh Networks. “Our integration with Check Point makes companies’ existing security infrastructure cloud-aware, leveraging their current investment for a seamless, end-to-end cloud security solution.”