Welcome!

News Feed Item

Skyfence Protects Cloud Apps against Account Hijacking, Insider Attacks and Data Theft

Skyfence Networks, the company that automates cloud app protection, today emerged from stealth mode and announced the Skyfence Cloud Gateway. Founded by former executives from Imperva and Websense, Skyfence enables organizations to protect against the leading threats identified by the Cloud Security Alliance (CSA): account/service traffic hijacking and malicious insiders. Skyfence integrates threat prevention, activity monitoring and compliance management to secure and prevent data theft on any cloud app.

CLICK TO TWEET: .@Skyfence protects #cloudapps against hijacking, insider attacks and #databreaches http://bit.ly/1kYshE5

“There are many benefits to moving enterprise applications to the cloud, however there are also inherent and constantly evolving risks. We need to enable cloud initiatives while maintaining our rigorous security standards,” said Kelly White, Vice President, Security Architecture and Assurance for Salt Lake City-based Zions Bank. “We are excited about Skyfence’s ability to provide complete visibility into user activity in the cloud along with automated, real-time analysis in order to identify cyber-attacks and inside threats as soon as they occur. This is what we need to keep up with the adoption of SaaS applications by the business.”

Threat Prevention: No Policies, No Problem

To protect cloud apps against the theft of legitimate user credentials by hackers or their abuse by malicious insiders, Skyfence has developed Dynamic User Fingerprinting™ technology. It can detect and block security breaches in real time without human intervention or the need to define any security policies. Dynamic User Fingering automatically analyzes network traffic and learns user activity without directly accessing the application. It creates a profile of each user based on access location, devices, recent activity, usage patterns and other parameters. This enables Skyfence to detect and prevent account hijacking due to stolen credentials, man-in-the-middle attacks from a compromised endpoint and insider attacks.

“As a rapidly growing airline with a mobile workforce using cloud apps that can be accessed anywhere we need visibility into account access and to make sure user accounts are not being hijacked. Skyfence provides that visibility with automatic anomaly detection,” said Robert Markel, Director of Information Security for Virgin America.

In addition to its automated threat prevention capabilities, Skyfence enables security teams to set policies defining how, when and where SaaS users can access data.

Single View Across all Cloud Apps

With multiple cloud apps being deployed across most organizations, it’s impossible for IT departments to manually monitor user activity. Skyfence serves as a single gateway for all SaaS apps that provides the visibility and security businesses need to embrace, not block, cloud usage. Since Skyfence monitors activity down to individual data objects, not just at the URL level, it provides unprecedented insights. From a single unified dashboard, Skyfence allows IT to easily view:

  • Data usage: Who viewed or modified what, when, and how often
  • Administrator activity: Including settings, permissions, and data access
  • API activity: External access to SaaS data through an API

“All of the organizations we have spoken with know and are concerned that their confidential data in cloud apps is at risk if a user’s credentials are stolen and they lack the ability to monitor activity in any meaningful way,” said Ofer Hendler, CEO of Skyfence. “Using our expertise in deep protocol analysis, we have built a transparent product that can just as easily detect attacks that come from inside or outside organization, and is able to monitor and capture all activity in any cloud app. The response we are hearing from customers is a sigh of relief.”

Bringing the Cloud into Compliance

To address compliance obligations, Skyfence enables separation of duties between SaaS administrators and IT security, and maintains an audit trail of all user access ranging from login events to a full activity log. At the click of a button, Skyfence can instantly generate activity reports for compliance audits and exposure reports for forensic analysis.

Deployment, Availability and Pricing

The Skyfence Cloud Gateway integrates with SAML authentication mechanisms, can be deployed in-line or in sniffer mode, and is available as a cloud service or an on-premise appliance. It does not require the installation of endpoint software. Skyfence is available immediately from the company and its business partners worldwide. Pricing is based per user per year.

Resources:

Video

Whitepaper

Corporate Profile

About Skyfence

Founded in 2012, Skyfence is the company that automates cloud app protection. The Skyfence Cloud Gateway uses Dynamic User Fingerprinting™ technology to detect and block account takeover attempts, insider attacks and data theft in real time. Skyfence centrally monitors all activity in any cloud service for complete visibility, control and auditability in one scalable, cost-effective solution. For more information visit: www.skyfence.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Phil Hombledal, Solution Architect at CollabNet, discussed how customers are able to achieve a level of transparency that e...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2017' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great t...
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, attendees learned about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how ...