Welcome!

News Feed Item

Skyfence Protects Cloud Apps against Account Hijacking, Insider Attacks and Data Theft

Skyfence Networks, the company that automates cloud app protection, today emerged from stealth mode and announced the Skyfence Cloud Gateway. Founded by former executives from Imperva and Websense, Skyfence enables organizations to protect against the leading threats identified by the Cloud Security Alliance (CSA): account/service traffic hijacking and malicious insiders. Skyfence integrates threat prevention, activity monitoring and compliance management to secure and prevent data theft on any cloud app.

CLICK TO TWEET: .@Skyfence protects #cloudapps against hijacking, insider attacks and #databreaches http://bit.ly/1kYshE5

“There are many benefits to moving enterprise applications to the cloud, however there are also inherent and constantly evolving risks. We need to enable cloud initiatives while maintaining our rigorous security standards,” said Kelly White, Vice President, Security Architecture and Assurance for Salt Lake City-based Zions Bank. “We are excited about Skyfence’s ability to provide complete visibility into user activity in the cloud along with automated, real-time analysis in order to identify cyber-attacks and inside threats as soon as they occur. This is what we need to keep up with the adoption of SaaS applications by the business.”

Threat Prevention: No Policies, No Problem

To protect cloud apps against the theft of legitimate user credentials by hackers or their abuse by malicious insiders, Skyfence has developed Dynamic User Fingerprinting™ technology. It can detect and block security breaches in real time without human intervention or the need to define any security policies. Dynamic User Fingering automatically analyzes network traffic and learns user activity without directly accessing the application. It creates a profile of each user based on access location, devices, recent activity, usage patterns and other parameters. This enables Skyfence to detect and prevent account hijacking due to stolen credentials, man-in-the-middle attacks from a compromised endpoint and insider attacks.

“As a rapidly growing airline with a mobile workforce using cloud apps that can be accessed anywhere we need visibility into account access and to make sure user accounts are not being hijacked. Skyfence provides that visibility with automatic anomaly detection,” said Robert Markel, Director of Information Security for Virgin America.

In addition to its automated threat prevention capabilities, Skyfence enables security teams to set policies defining how, when and where SaaS users can access data.

Single View Across all Cloud Apps

With multiple cloud apps being deployed across most organizations, it’s impossible for IT departments to manually monitor user activity. Skyfence serves as a single gateway for all SaaS apps that provides the visibility and security businesses need to embrace, not block, cloud usage. Since Skyfence monitors activity down to individual data objects, not just at the URL level, it provides unprecedented insights. From a single unified dashboard, Skyfence allows IT to easily view:

  • Data usage: Who viewed or modified what, when, and how often
  • Administrator activity: Including settings, permissions, and data access
  • API activity: External access to SaaS data through an API

“All of the organizations we have spoken with know and are concerned that their confidential data in cloud apps is at risk if a user’s credentials are stolen and they lack the ability to monitor activity in any meaningful way,” said Ofer Hendler, CEO of Skyfence. “Using our expertise in deep protocol analysis, we have built a transparent product that can just as easily detect attacks that come from inside or outside organization, and is able to monitor and capture all activity in any cloud app. The response we are hearing from customers is a sigh of relief.”

Bringing the Cloud into Compliance

To address compliance obligations, Skyfence enables separation of duties between SaaS administrators and IT security, and maintains an audit trail of all user access ranging from login events to a full activity log. At the click of a button, Skyfence can instantly generate activity reports for compliance audits and exposure reports for forensic analysis.

Deployment, Availability and Pricing

The Skyfence Cloud Gateway integrates with SAML authentication mechanisms, can be deployed in-line or in sniffer mode, and is available as a cloud service or an on-premise appliance. It does not require the installation of endpoint software. Skyfence is available immediately from the company and its business partners worldwide. Pricing is based per user per year.

Resources:

Video

Whitepaper

Corporate Profile

About Skyfence

Founded in 2012, Skyfence is the company that automates cloud app protection. The Skyfence Cloud Gateway uses Dynamic User Fingerprinting™ technology to detect and block account takeover attempts, insider attacks and data theft in real time. Skyfence centrally monitors all activity in any cloud service for complete visibility, control and auditability in one scalable, cost-effective solution. For more information visit: www.skyfence.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and 21st International Cloud Expo, which will take place in November in Silicon Valley, California.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs.
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we’ll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand ...
In his session at @ThingsExpo, Sudarshan Krishnamurthi, a Senior Manager, Business Strategy, at Cisco Systems, will discuss how IT and operational technology (OT) work together, as opposed to being in separate siloes as once was traditional. Attendees will learn how to fully leverage the power of IoT in their organization by bringing the two sides together and bridging the communication gap. He will also look at what good leadership must entail in order to accomplish this, and how IT managers ca...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).