Welcome!

News Feed Item

Skyfence Protects Cloud Apps against Account Hijacking, Insider Attacks and Data Theft

Skyfence Networks, the company that automates cloud app protection, today emerged from stealth mode and announced the Skyfence Cloud Gateway. Founded by former executives from Imperva and Websense, Skyfence enables organizations to protect against the leading threats identified by the Cloud Security Alliance (CSA): account/service traffic hijacking and malicious insiders. Skyfence integrates threat prevention, activity monitoring and compliance management to secure and prevent data theft on any cloud app.

CLICK TO TWEET: .@Skyfence protects #cloudapps against hijacking, insider attacks and #databreaches http://bit.ly/1kYshE5

“There are many benefits to moving enterprise applications to the cloud, however there are also inherent and constantly evolving risks. We need to enable cloud initiatives while maintaining our rigorous security standards,” said Kelly White, Vice President, Security Architecture and Assurance for Salt Lake City-based Zions Bank. “We are excited about Skyfence’s ability to provide complete visibility into user activity in the cloud along with automated, real-time analysis in order to identify cyber-attacks and inside threats as soon as they occur. This is what we need to keep up with the adoption of SaaS applications by the business.”

Threat Prevention: No Policies, No Problem

To protect cloud apps against the theft of legitimate user credentials by hackers or their abuse by malicious insiders, Skyfence has developed Dynamic User Fingerprinting™ technology. It can detect and block security breaches in real time without human intervention or the need to define any security policies. Dynamic User Fingering automatically analyzes network traffic and learns user activity without directly accessing the application. It creates a profile of each user based on access location, devices, recent activity, usage patterns and other parameters. This enables Skyfence to detect and prevent account hijacking due to stolen credentials, man-in-the-middle attacks from a compromised endpoint and insider attacks.

“As a rapidly growing airline with a mobile workforce using cloud apps that can be accessed anywhere we need visibility into account access and to make sure user accounts are not being hijacked. Skyfence provides that visibility with automatic anomaly detection,” said Robert Markel, Director of Information Security for Virgin America.

In addition to its automated threat prevention capabilities, Skyfence enables security teams to set policies defining how, when and where SaaS users can access data.

Single View Across all Cloud Apps

With multiple cloud apps being deployed across most organizations, it’s impossible for IT departments to manually monitor user activity. Skyfence serves as a single gateway for all SaaS apps that provides the visibility and security businesses need to embrace, not block, cloud usage. Since Skyfence monitors activity down to individual data objects, not just at the URL level, it provides unprecedented insights. From a single unified dashboard, Skyfence allows IT to easily view:

  • Data usage: Who viewed or modified what, when, and how often
  • Administrator activity: Including settings, permissions, and data access
  • API activity: External access to SaaS data through an API

“All of the organizations we have spoken with know and are concerned that their confidential data in cloud apps is at risk if a user’s credentials are stolen and they lack the ability to monitor activity in any meaningful way,” said Ofer Hendler, CEO of Skyfence. “Using our expertise in deep protocol analysis, we have built a transparent product that can just as easily detect attacks that come from inside or outside organization, and is able to monitor and capture all activity in any cloud app. The response we are hearing from customers is a sigh of relief.”

Bringing the Cloud into Compliance

To address compliance obligations, Skyfence enables separation of duties between SaaS administrators and IT security, and maintains an audit trail of all user access ranging from login events to a full activity log. At the click of a button, Skyfence can instantly generate activity reports for compliance audits and exposure reports for forensic analysis.

Deployment, Availability and Pricing

The Skyfence Cloud Gateway integrates with SAML authentication mechanisms, can be deployed in-line or in sniffer mode, and is available as a cloud service or an on-premise appliance. It does not require the installation of endpoint software. Skyfence is available immediately from the company and its business partners worldwide. Pricing is based per user per year.

Resources:

Video

Whitepaper

Corporate Profile

About Skyfence

Founded in 2012, Skyfence is the company that automates cloud app protection. The Skyfence Cloud Gateway uses Dynamic User Fingerprinting™ technology to detect and block account takeover attempts, insider attacks and data theft in real time. Skyfence centrally monitors all activity in any cloud service for complete visibility, control and auditability in one scalable, cost-effective solution. For more information visit: www.skyfence.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Big Data has been changing the world. IoT fuels the further transformation recently. How are Big Data and IoT related? In his session at @BigDataExpo, Tony Shan, a renowned visionary and thought leader, will explore the interplay of Big Data and IoT. He will anatomize Big Data and IoT separately in terms of what, which, why, where, when, who, how and how much. He will then analyze the relationship between IoT and Big Data, specifically the drilldown of how the 4Vs of Big Data (Volume, Variety,...
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, will discuss how VPaaS enables you to move fast, creating scalable video experiences that reach your...
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production. He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captu...
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...