When we talk about enterprise cloud security, we’re usually given a choice between using popular cloud services at the risk of compromising information or using a private cloud that puts limitations on users. Now you can go sky high in the cloud and have the piece of mind that information will be safe, secure and accessible without making it hard for employees to use.
Proactive & Adaptive Security
Even if you’ve chosen not to use Dropbox or Box to store and share company documents, we’d hazard a guess that a few employees still use those apps to do so. Why? Not because they want to put information at risk, but because it’s so easy to share and collaborate with others. Thanks to the folks at Skyhigh Networks, their new Skyhigh Secure solution offers an olive branch to IT, by making it possible to offer secure access to popular cloud services without the added friction that can affect user adoption.
Skyhigh Secure’s mobile-to-cloud capabilities enable secure access of cloud services directly from mobile devices without the need for agents, downloads, or other footprint on the device, and without the need for VPN or backhaul of mobile traffic through the enterprise network. Removing those types of security obstacles means that users can just sign in and start sharing. But that doesn’t mean security has been removed. Skyhigh Secure provides proactive and adaptive security that leverages real-time application and usage analytics to detect threats and secure data to and from cloud services.
Cloud is the New Normal
When we spoke with Rajiv Gupta, CEO and co-founder at Skyhigh, he brought up an interesting point about how to manage the security of information within the enterprise. Depending upon your job responsibilities or your administrative access, the amount of information you upload, download or otherwise share can vary greatly. You can’t effectively set universal controls on the amount or size of information that can be accessed and have it work for both digital asset managers and engineers, sales managers and CIOs. Gupta says adoption of cloud has become adhoc, making it harder to understand what normal is. As a result, Skyhigh offers the ability to audit application usage at a granular level and in real-time so IT can be alerted of any anomalous use.
Furthemore, Skyhigh Secure can allow or deny access to corporate data in the cloud based on user, device and geographic location. It also provides inline and offline data loss prevention options for cloud data including encryption, action blocks and integration with existing on-premise data loss prevention solutions.
Cloud to Cloud Security
Perhaps what is most unique about Skyhigh Secure is its Cloud-to-Cloud Control, which provides consistent enforcement of corporate policies as data moves from mobile to cloud, premise to cloud, and even from cloud service to cloud service. That means if you’re accessing information that pulls in data from another cloud-based platform, all access is protected accordingly. Most of us probably don't realize how much information is actually hosted in the cloud. But IT does and they struggle to control access and security as the rest of us leap from cloud to cloud sharing, collaborating and downloading information along the way. With Skyhigh Secure both IT and users can feel empowered to collaborate.
Survive and Thrive in the Cloud
Overall, Skyhigh Secure responds to how the cloud has become central to enterprise productivity. Like it or not, it’s changing how people work and in turn, is changing how companies keep information secure. The reason commercial cloud apps are popular is because they’re easy to use. Employees don’t care how hard it is to keep documents secure, they just want to work seamlessly across applications. The sooner companies understand how to ensure security without impeding productivity, the better prepared they’ll be to thrive in the cloud.
- The Future of Digital Marketing: 8 Trends
- Cirrus Insight to Unite Salesforce, Gmail on Mobile Devices
- 2014 Predictions: What Side of the Future Are You On?
- Oracle WebCenter Sites Review: Strengths, Weaknesses
- 7 Things Stew Leonard's Can Teach You About Your Customers
- Why Apple Needs Topsy in a $200 Million Way
- How Is Hadoop Like Teenage Sex? [Infographic]