Entries from 2014-09-01 to 1 month

Legal and Compliance Issues with Cloud Based Data Management

Security in a cloud based computing environment is at the forefront of concerns for enterprises. Cyber security is a risk to any organization that relies heavily on data, and this is compounded by regulatory issues that organizations face.…

Managed Application Service Providers with a Cloud Service Broker

The utilization of cloud services for organizations presents a wide range of efficiencies, but there are many misunderstood requirements that are beginning to place new burdens on organizations. The customization, management and integratio…

The Importance of Data Loss Prevention Software in the Healthcare Industry

Recent information compiled by Forrester stresses the need for data loss prevention software throughout the healthcare industry. In the age of electronic health records that help providers record and share the healthcare data of their pati…

Will Security Kill The Cloud?

Hardware such as thumb drives, cell phones, laptops and even computers are becoming outdated in terms of their utility as data storage devices. They are easily lost, stolen or prone to damage by viruses or even physical destruction by an u…

Healthcare Data Breach Risks Drive Data Loss Prevention Market

Electronic health records have become a more efficient and effective way for health care providers and patients to share medical records. Electronic health records provide convenience and cost savings for many, but with all of this digital…

Dyre Straits: Millions of Cloud Users Vulnerable to New Trojan

A powerful new strain of malware called Dyre (or Dyreza) not only poses a serious threat to consumers and businesses, it also signifies the cloud has arrived. Dyre not only uses the cloud as a vector for distributing malware to client mach…

Skyhigh Teams with Palo Alto Networks to Extend Next-Gen Firewall to the Cloud – and More

As part of our mission to help organizations securely enable cloud services, we’ve expanded our range of partnerships beyond cloud service providers to include security solution providers. These strategic partnerships enable joint customer…

Only 1 in 100 Cloud Providers Meet Proposed EU Data Protection Requirements

Whether your organization is based in Europe, has operations in Europe, or handles data pertaining to EU residents, a proposed EU regulation in the works will have a significant impact on which cloud security services you use and how you u…

Skyhigh Networks and SafeNet Team Up on Encryption Key Management

More and more organizations have been asking to encrypt their data in business-critical SaaS applications such as Salesforce, ServiceNow, and Microsoft Office 365 with customer-managed keys to ensure compliance and provide additional data …

Skyhigh and Google Drive for Work

Google recently announced a new version of its popular file-sharing service, Google Drive for Work, that lets enterprise users securely collaborate in the cloud. This new offering builds on the success of Google Drive in the consumer world…

Skyhigh 1st Cloud Access Security Broker to be ISO 27001 Certified

One of the most robust certifications a cloud security service provider can attain is ISO 27001 certification. Attaining ISO certification is is a reflection of the company’s commitment to security across multiple functions, and a reflecti…

Point-in-Time Cloud Usage Data Can Be Deceiving

A Telling StoryA customer recently shared an interesting story with us. They told us that they were monitoring the growth in cloud service usage over time and saw some interesting patterns that we could share with our readers. They reporte…

Just What the Doctor Ordered: A Prescription for Cloud Data Security for Healthcare Service Providers

Cloud services are here to stay, and practically everybody is embracing them. In fact, the cloud computing industry is growing at the torrid pace of nearly 30% per year right now, according to Pike Research.Certainly healthcare service pro…

The Network Meets the Cloud

It was sixteen years back that I was staring at a Cisco router prompt and trying to grapple with the difference between a startup configuration and a running configuration. Things have come a long way and there have been tectonic shifts in…

Meeting Data Governance Requirements with Collaboration Control for Box

Enterprises are embracing content sharing and collaboration from Box to make their employees more productive and their businesses more nimble. The benefits are clear: employees can access their files and work from anywhere on any device. H…

User-Centric Security, Compliance, and Governance for Box Customers

With BoxWorks 2014 growing into new digs at Moscone Center, Box has cemented its spot in the upper echelon of cloud service providers alongside names like Oracle, SalesForce, and ServiceNow. Box’s traction in the marketplace speaks volumes…

Cisco’s Path to Secure Cloud Enablement

With a seemingly nonstop feed of menacing headlines announcing corporate data breaches, it is becoming impossible for IT departments to maintain a “head in the sand” attitude towards security vulnerabilities.“If you are the head of securit…

The Emergence of the Cloud Service Broker

To work with some cloud service providers you need to spend a lot of effort and time managing multiple data streams, multiple passwords and multiple payment processing platforms. It’s not a one-person project and you will likely need a sta…

Personal Cloud Security Is Within Everyone’s Reach

The latest news on cloud security issues involves alleged hackers who broke into Apple iCloud accounts to steal personal photos of famous female celebrities like Jennifer Lawrence and Kate Upton. While much speculation exists as to the val…

Data Loss Prevention Tools Prove Invaluable to Online Organizations

For over a decade the growth in cyber-attacks have escalated to a point where data theft and breach have become unavoidable. These attacks have increased not only in numbers, but also in sophistication.In 2013 alone, data breach incidents …

Data Loss Prevention Software Key to Consumers’ Peace of Mind

With Cyber attacks on the rise and faith in online security declining fast, many consumers and the professionals who serve their needs in retail, social media, and online buying sites have good reason for concern: In the year 2013 alone, t…

Data Loss Prevention

Every day technology provides us with huge advances that can make our lives easier, but threats to data security are becoming more serious by the day as well. Cyber-attacks against individuals and corporations are becoming more common, and…

The Rapidly Emerging Security Market Called Cloud Access Security Broker, Cloud Application Control

When the founders of Skyhigh Networks started the company in 2012, they knew they were bringing to market an important service that would fill a major need for companies of all sizes. What they didn’t know at the time is that Skyhigh would…

Rise of the (Malware) Machines

Take any movie where robots rise up against their human makers, and you’ll see fear and panic set in. This happens in films such as The Terminator (1984), Screamers (1995), and I, Robot (2004). Why? Because robots operate on autopilot and …

Financial Institutions Protect Themselves with Data Loss Prevention Tools

Some of the worst and most detrimental risk a company in today s era can take is due to their lack of protection when storing sensitive information in the cloud. Companies should be more vigilant and cognizant of their storing practices. O…

Cloud Security Deemed Critical for Contemporary Firms

Cloud computing is an innovative influence that’s directly affected and changed the commerce operations of masses of companies reaching numerous businesses and sectors of several dimensions. Cloud computing has allowed businesses to functi…