News Feed Item

Skyfence Protects Cloud Apps against Account Hijacking, Insider Attacks and Data Theft

Skyfence Networks, the company that automates cloud app protection, today emerged from stealth mode and announced the Skyfence Cloud Gateway. Founded by former executives from Imperva and Websense, Skyfence enables organizations to protect against the leading threats identified by the Cloud Security Alliance (CSA): account/service traffic hijacking and malicious insiders. Skyfence integrates threat prevention, activity monitoring and compliance management to secure and prevent data theft on any cloud app.

CLICK TO TWEET: [email protected] protects #cloudapps against hijacking, insider attacks and #databreaches http://bit.ly/1kYshE5

“There are many benefits to moving enterprise applications to the cloud, however there are also inherent and constantly evolving risks. We need to enable cloud initiatives while maintaining our rigorous security standards,” said Kelly White, Vice President, Security Architecture and Assurance for Salt Lake City-based Zions Bank. “We are excited about Skyfence’s ability to provide complete visibility into user activity in the cloud along with automated, real-time analysis in order to identify cyber-attacks and inside threats as soon as they occur. This is what we need to keep up with the adoption of SaaS applications by the business.”

Threat Prevention: No Policies, No Problem

To protect cloud apps against the theft of legitimate user credentials by hackers or their abuse by malicious insiders, Skyfence has developed Dynamic User Fingerprinting™ technology. It can detect and block security breaches in real time without human intervention or the need to define any security policies. Dynamic User Fingering automatically analyzes network traffic and learns user activity without directly accessing the application. It creates a profile of each user based on access location, devices, recent activity, usage patterns and other parameters. This enables Skyfence to detect and prevent account hijacking due to stolen credentials, man-in-the-middle attacks from a compromised endpoint and insider attacks.

“As a rapidly growing airline with a mobile workforce using cloud apps that can be accessed anywhere we need visibility into account access and to make sure user accounts are not being hijacked. Skyfence provides that visibility with automatic anomaly detection,” said Robert Markel, Director of Information Security for Virgin America.

In addition to its automated threat prevention capabilities, Skyfence enables security teams to set policies defining how, when and where SaaS users can access data.

Single View Across all Cloud Apps

With multiple cloud apps being deployed across most organizations, it’s impossible for IT departments to manually monitor user activity. Skyfence serves as a single gateway for all SaaS apps that provides the visibility and security businesses need to embrace, not block, cloud usage. Since Skyfence monitors activity down to individual data objects, not just at the URL level, it provides unprecedented insights. From a single unified dashboard, Skyfence allows IT to easily view:

  • Data usage: Who viewed or modified what, when, and how often
  • Administrator activity: Including settings, permissions, and data access
  • API activity: External access to SaaS data through an API

“All of the organizations we have spoken with know and are concerned that their confidential data in cloud apps is at risk if a user’s credentials are stolen and they lack the ability to monitor activity in any meaningful way,” said Ofer Hendler, CEO of Skyfence. “Using our expertise in deep protocol analysis, we have built a transparent product that can just as easily detect attacks that come from inside or outside organization, and is able to monitor and capture all activity in any cloud app. The response we are hearing from customers is a sigh of relief.”

Bringing the Cloud into Compliance

To address compliance obligations, Skyfence enables separation of duties between SaaS administrators and IT security, and maintains an audit trail of all user access ranging from login events to a full activity log. At the click of a button, Skyfence can instantly generate activity reports for compliance audits and exposure reports for forensic analysis.

Deployment, Availability and Pricing

The Skyfence Cloud Gateway integrates with SAML authentication mechanisms, can be deployed in-line or in sniffer mode, and is available as a cloud service or an on-premise appliance. It does not require the installation of endpoint software. Skyfence is available immediately from the company and its business partners worldwide. Pricing is based per user per year.




Corporate Profile

About Skyfence

Founded in 2012, Skyfence is the company that automates cloud app protection. The Skyfence Cloud Gateway uses Dynamic User Fingerprinting™ technology to detect and block account takeover attempts, insider attacks and data theft in real time. Skyfence centrally monitors all activity in any cloud service for complete visibility, control and auditability in one scalable, cost-effective solution. For more information visit: www.skyfence.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...