Welcome!

News Feed Item

Skyfence Protects Cloud Apps against Account Hijacking, Insider Attacks and Data Theft

Skyfence Networks, the company that automates cloud app protection, today emerged from stealth mode and announced the Skyfence Cloud Gateway. Founded by former executives from Imperva and Websense, Skyfence enables organizations to protect against the leading threats identified by the Cloud Security Alliance (CSA): account/service traffic hijacking and malicious insiders. Skyfence integrates threat prevention, activity monitoring and compliance management to secure and prevent data theft on any cloud app.

CLICK TO TWEET: .@Skyfence protects #cloudapps against hijacking, insider attacks and #databreaches http://bit.ly/1kYshE5

“There are many benefits to moving enterprise applications to the cloud, however there are also inherent and constantly evolving risks. We need to enable cloud initiatives while maintaining our rigorous security standards,” said Kelly White, Vice President, Security Architecture and Assurance for Salt Lake City-based Zions Bank. “We are excited about Skyfence’s ability to provide complete visibility into user activity in the cloud along with automated, real-time analysis in order to identify cyber-attacks and inside threats as soon as they occur. This is what we need to keep up with the adoption of SaaS applications by the business.”

Threat Prevention: No Policies, No Problem

To protect cloud apps against the theft of legitimate user credentials by hackers or their abuse by malicious insiders, Skyfence has developed Dynamic User Fingerprinting™ technology. It can detect and block security breaches in real time without human intervention or the need to define any security policies. Dynamic User Fingering automatically analyzes network traffic and learns user activity without directly accessing the application. It creates a profile of each user based on access location, devices, recent activity, usage patterns and other parameters. This enables Skyfence to detect and prevent account hijacking due to stolen credentials, man-in-the-middle attacks from a compromised endpoint and insider attacks.

“As a rapidly growing airline with a mobile workforce using cloud apps that can be accessed anywhere we need visibility into account access and to make sure user accounts are not being hijacked. Skyfence provides that visibility with automatic anomaly detection,” said Robert Markel, Director of Information Security for Virgin America.

In addition to its automated threat prevention capabilities, Skyfence enables security teams to set policies defining how, when and where SaaS users can access data.

Single View Across all Cloud Apps

With multiple cloud apps being deployed across most organizations, it’s impossible for IT departments to manually monitor user activity. Skyfence serves as a single gateway for all SaaS apps that provides the visibility and security businesses need to embrace, not block, cloud usage. Since Skyfence monitors activity down to individual data objects, not just at the URL level, it provides unprecedented insights. From a single unified dashboard, Skyfence allows IT to easily view:

  • Data usage: Who viewed or modified what, when, and how often
  • Administrator activity: Including settings, permissions, and data access
  • API activity: External access to SaaS data through an API

“All of the organizations we have spoken with know and are concerned that their confidential data in cloud apps is at risk if a user’s credentials are stolen and they lack the ability to monitor activity in any meaningful way,” said Ofer Hendler, CEO of Skyfence. “Using our expertise in deep protocol analysis, we have built a transparent product that can just as easily detect attacks that come from inside or outside organization, and is able to monitor and capture all activity in any cloud app. The response we are hearing from customers is a sigh of relief.”

Bringing the Cloud into Compliance

To address compliance obligations, Skyfence enables separation of duties between SaaS administrators and IT security, and maintains an audit trail of all user access ranging from login events to a full activity log. At the click of a button, Skyfence can instantly generate activity reports for compliance audits and exposure reports for forensic analysis.

Deployment, Availability and Pricing

The Skyfence Cloud Gateway integrates with SAML authentication mechanisms, can be deployed in-line or in sniffer mode, and is available as a cloud service or an on-premise appliance. It does not require the installation of endpoint software. Skyfence is available immediately from the company and its business partners worldwide. Pricing is based per user per year.

Resources:

Video

Whitepaper

Corporate Profile

About Skyfence

Founded in 2012, Skyfence is the company that automates cloud app protection. The Skyfence Cloud Gateway uses Dynamic User Fingerprinting™ technology to detect and block account takeover attempts, insider attacks and data theft in real time. Skyfence centrally monitors all activity in any cloud service for complete visibility, control and auditability in one scalable, cost-effective solution. For more information visit: www.skyfence.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it ...
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?