Skyhigh for Office 365

Similar documents
Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

The Netskope Active Platform

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Unified Security, ATP and more

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Security Overview Enterprise-Class Secure Mobile File Sharing

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Safeguarding the cloud with IBM Dynamic Cloud Security

Top. Enterprise Reasons to Select kiteworks by Accellion

Enabling Security Operations with RSA envision. August, 2009

Top. Reasons Legal Firms Select kiteworks by Accellion

Vulnerability Management

Centrify Cloud Connector Deployment Guide

How To Secure Shareware Kiteworks By Accellion

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Cisco Advanced Malware Protection for Endpoints

ENABLING FAST RESPONSES THREAT MONITORING

The Cloud App Visibility Blindspot

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

CyberArk Privileged Threat Analytics. Solution Brief

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

CA Technologies Data Protection

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

End-user Security Analytics Strengthens Protection with ArcSight

Securing SharePoint 101. Rob Rachwald Imperva

Practical DLP Deployment

Data Protection McAfee s Endpoint and Network Data Loss Prevention

Cloud App Security. Tiberio Molino Sales Engineer

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Modular Network Security. Tyler Carter, McAfee Network Security

Configuration Information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Caretower s SIEM Managed Security Services

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

White paper. Four Best Practices for Secure Web Access

Information Technology Policy

SaaS Security Best Practices: Minimizing Risk in the Cloud

RSA Security Analytics

ALERT LOGIC FOR HIPAA COMPLIANCE

Symantec Consulting Services

DIGITAL GUARDIAN 6. The Foundation of Enterprise Information Protection

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

On and off premises technologies Which is best for you?

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

CLOUD ACCESS SECURITY BROKERS

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Cyberoam Perspective BFSI Security Guidelines. Overview

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Comprehensive real-time protection against Advanced Threats and data theft

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Using SIEM for Real- Time Threat Detection

RSA Identity Management & Governance (Aveksa)

Vistara Lifecycle Management

What is Security Intelligence?

Configuration Information

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Implementing Software- Defined Security with CloudPassage Halo

Q1 Labs Corporate Overview

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Enterprise Security Solutions

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Managing PHI in the Cloud Best Practices

Securing Office 365 with Symantec

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

RFI Template for Enterprise MDM Solutions

Vendor Landscape: Security Information & Event Management (SIEM)

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Analyzing HTTP/HTTPS Traffic Logs

Executive s Guide to Cloud Access Security Brokers

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Cisco Advanced Malware Protection for Endpoints

VMware Integrated Partner Solutions for Networking and Security

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Transcription:

Skyhigh for Office Skyhigh for Office is a comprehensive cloud security solution, providing visibility into user activity, compliance and governance policy enforcement, and threat protection. Microsoft is committed to protecting your company s data in its cloud-based services. However, many enterprises require greater visibility and control over usage and an additional layer of protection for data in SharePoint Online, OneDrive, Exchange Online, and Yammer. Using Skyhigh along with Microsoft Graph, companies can leverage the massive productivity gains enabled by Office while meeting their various compliance, threat protection and data security requirements. Rob Lefferts, General Manager, Extensibility With Skyhigh for Office you can: Enforce data loss prevention policies for data at rest and in motion Detect activity indicative of insider threat and compromised accounts Audit collaboration activity and enforce data sharing policies Identify shadow IT cloud services in use and coach users onto Office Capture and complete audit trail of all user and admin activity for investigations Control access to data based on user role, device, and location

Visibility: Shadow IT Discovery Identify any shadow IT cloud services employees are using in place of the corporate stand, OneDrive, Yammer and SharePoint. Coaching and Enforcement Displays just-in-time coaching messages guiding users from unapproved services to Office and enforces granular policies such as read-only access. On-Demand Data Scan Examines existing content to identify sensitive data, subject to compliance requirements or security policies. Usage Analytics Identifies all users and groups accessing Office and reveals which users are accessing sensitive data. Compliance: Sensitive Data Analytics Provides a detailed and continuous view of sensitive data stored or uploaded to cloud to cloud services including the data location and users who have accessed it. Secure Collaboration Enforces external sharing policies based on domain whitelist/blacklist and content and educates users on acceptable collaboration policies. Cloud Data Loss Prevention Enforces DLP policies based on data identifiers, keywords, and regular expressions and supports alerting, blocking, tombstoning and quarantining actions. Pre-Built DLP Templates Provides out-of-the-box Office DLP templates for all major verticals and regulations to help identify sensitive content such as PII, PHI, or IP. Policy Violation Management Offers a unified interface to both review and remediate all DLP, access control, or collaboration policy violations. Usage Analytics: Identify all users and groups accessing sensitive data in Office. Collaboration Analytics Visually summarises sharing with third-party business partners, personal emails and internal users and reports on policy exceptions. Policy Violation Management: View all violations via a unified interface.

On-Premises DLP Integration Provides integration and closed-loop remediation with existing on premise DLP solutions such as Symantec, EMC RSA, Intel McAfee, and Websense. Closed-Loop Policy Enforcement Leverages policies in existing DLP systems, enforces policies and registers enforcement actions in the DLP system where the policy is managed. Contextual Access Control Enables on premise and mobile access control policies based on user, device and geography with coarse blocking and granular view, edit, and download permissions. Contextual Access Control: Control access by user, device, and location. Collaboration Analytics: Visualises sharing between departments and with external organisations. Data Security: Searchable Symmetric Encryption Encrypts unstructured data and leverages advancements in encrypted search indexes to enable end-user search without compromising security. Key Management Support Provides flexible cloud or on premise deployment options and integrates with leading key management servers supporting the KMIP protocol. Preservation of Application Functionality Preserves end-user functions such as search, sort and format using academia and peer-reviewed encryption schemes. Rights Management Defines a circle of trust for any document and enforces rights management policies for intellectual property though integration with DRM solutions. Device Fingerprinting Identifies individual devices as managed or unmanaged based on a unique device fingerprint to enable distinct access policies for unmanaged devices. Threat Protection: Office SOC Delivers a security intelligence dashboard and incidentresponse workflow for potential insider/privileged user threats, compromised accounts, and flight risks.

Cloud Activity Monitoring Provides a comprehensive audit trail of all user and admin activities to support post-incident investigations and forensics. User Behaviour Analytics Automatically builds a self-learning model based on multiple heuristics and identifies anomalies indicative of insider threat data exfiltration. Geo-Location Analytics Visualises global access patterns and analyses activity to identify impossible cross-region access attempts indicative of compromised accounts. Geo-Location Analytics: Detects and remediates compromised account activity. Privileged User Analytics Identifies excessive user permissions, zombie administrator accounts, inappropriate access to data and unwarranted escalation of privileges and user provisioning. Adaptive Authentication Forces additional authentication steps in real-time in response to high-risk behaviours by integrating with single sign-on solutions. Platform: Enterprise Connector Collects logs from firewalls, proxies, SIEMs, and log aggregation products, integrates with LDAP solutions and tokenises sensitive data before uploading to the cloud. Integration with SIEMs Combine Skyhigh anomaly and event data with events from other systems and leverage your existing incident remediation process. Integration with Key Management Systems Seamlessly integrates with your existing key management systems using KMIP to encrypt data with enterprisecontrolled keys. Seamless SSO Integration Integrates with single sign-on (SSO) solutions, enabling pervasive and seamless policy enforcement including access control and encryption. On-Network and Off-Network Support Supports on-network access without requiring additional agents. Flexible Deployment Options Offers the ability to deploy Skyhigh in the cloud, on premise as a virtual appliance or in a hybrid model. Comprehensive Deployment Architecture Leverages a complete coverage model including log analysis, API integration and inline forward and reverse proxy deployment to support all cloud access scenarios.

Only Skyhigh Our approach eliminates the need for new device agents, ripping and replacing existing infrastructure and on premise appliances a win for both users and IT. Proven in production with the largest global enterprises analysing over 2 billion events daily per customer, revealing data trends across 12+ months. Leverages machine learning to tune a model of user behaviour based on network affects across 23+ million users and signatures for 16,000+ cloud services. Tokenises data on premises and obfuscates enterprise identity with an approach approved by financial, healthcare and European organisations. Delivers function-preserving encryption, searchable symmetric encryption with enterprise-controlled keys, rights management and best-in-class DLP. Patented approach to ensure a seamless and persistent layer of data protection for on-network and off-network access without device agents.