Z Services Cloud
Access Security Broker


Bring communication together using Slack’s real-time messaging and collaboration while meeting security, compliance, and governance requirements

Enforce data loss prevention policies across Slack

Z Services CASB enforces DLP policies for files and messages across Slack channels to ensure compliance with regulations and internal policies. Z Services CASB supports DLP rules based on keywords, data identifiers, user groups, and regular expressions. Enforcement actions include coach users, notify administrator, block, encrypt, quarantine, and tombstone. Leverage pre-built industry templates, create custom policies in Z Services CASB, or leverage policies in an existing on-premises DLP solution.

Unified DLP reporting and remediation

Z Services CASB reports on DLP violations in Slack and other cloud services in a unified interface with highlighted excerpts revealing the exact content that triggered the DLP policy. During review, if a file does not violate a policy, the reviewer can rollback the remediation action to restore the file and/or its sharing permissions. Quarantined files are stored in a secure account within Slack, not in Z Services CASB's platform, for added security.

Deep integration with on-premises DLP solutions

With Z Services CASB you have the option of leveraging our best-in-class DLP engine or the policies in your existing on-premises solution such as Symantec DLP, Intel McAfee DLP, Force point DLP, and more. Z Services CASB optionally performs a first-pass content inspection, brokers inspection by the on-premises solution, acts as an enforcement point to apply policies to data in the cloud, and registers enforcement in the on-premises solution that maintains the policy.

Detect internal and external threats

Z Services CASB captures a complete record of all user activity in Slack and leverages machine learning to analyze activity across multiple heuristics and accurately detect threats. As a comprehensive cloud security platform, Z Services CASB can detect cross-cloud threats that involve usage across Slack and other cloud services. As threats are resolved, Z Services CASB automatically incorporates this data into its behavioral models to improve detection accuracy.

Detect internal and external threats

Insider threats

Z Services CASB automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat, whether the threat is accidental or malicious. Using Guided Learning, you can fine tune the detection of cloud-based threats by providing feedback to the system that is incorporated into models of user behavior to more accurately detect future threats.

Compromised accounts

Z Services CASB detects compromised account activity in Slack based on brute force login attempts, logins from new and untrusted locations for a specific user, and consecutive login attempts from two locations in a time period that implies impossible travel, even if the two logins occur across two cloud services. Darknet Intelligence reveals user accounts for sale online that are at risk of compromise

Secure BYOD access to Slack

Z Services CASB enforces fine-grained access policies, such as allowing document preview on unmanaged devices but preventing downloads to devices without appropriate endpoint security. Z Services CASB can also integrate with identity management solutions to require additional factors of authentication for users based on device or access patterns.

Secure BYOD access to Slack

Make Slack your corporate standard

Z Services CASB identifies collaboration solutions that employees use in place of the corporate standard, Slack, and provides a risk rating for each service. Using Z Services CASB, you can enforce risk-based governance controls and coach users to Slack to improve collaboration while also reducing cost and risk.

Make Slack your corporate standard



Cloud Data Loss Prevention
Enforces DLP policies based on data identifiers, keywords, and structured/unstructured fingerprints across data at rest and uploaded or shared in real time.
Pre-Built DLP Templates
Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.
Unstructured Data Fingerprinting
Fingerprints sensitive files and detects exact match and partial or derivative matches with a policy-defined threshold for percentage similarity to the original.
Policy Violation Management
Offers a unified interface to review DLP violations, take manual action, and rollback an automatic remediation action to restore a file.
Closed-Loop Policy Enforcement
Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.
Structured Data Fingerprinting
Fingerprints billions of unique values stored in enterprise databases and systems of record and supports exact match detection of each value.
Multi-Tier Remediation
Provides coach user, notify administrator, block, apply rights management, quarantine, tombstone, and delete options and enables tiered response based on severity.
Match Highlighting
Displays an excerpt with content that triggered a DLP violation. Enterprises, not Z Services CASB, store excerpts, meeting stringent privacy requirements.


Slack SOC
Delivers a threat dashboard and incident-response workflow to review and remediate insider threats, privileged user threats, and compromised accounts.
User Behavior Analytics
Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.
Privileged User Analytics
Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.
Cloud Phishing Protection
Detects URLs associated with phishing and malware in Slack messages and blocks high-risk URLs to protect enterprise users.
Guided Learning
Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.
Cloud Activity Monitoring
Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.
Account Compromise Analytics
Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts
Malware Protection
Identifies and blocks known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware.


Shadow IT Discovery
Discovers all shadow IT cloud services employees are using in place of the corporate standard, Slack.
Usage Analytics
Identifies all users and groups accessing Slack and reveals which users are accessing sensitive data.
Coaching and Enforcement
Displays just-in-time coaching messages guiding users from unapproved services to Slack and enforces granular policies such as read-only access.
User Groups
Discovers and groups users from directory services and Slack. User groups can be leveraged for analytics and policy enforcement.


Contextual Access Control
Enforces policies based on user, managed/unmanaged device, personal/corporate account, and geography with coarse and activity-level enforcement.
Encryption and Tokenization
Delivers peer-reviewed, function-preserving encryption schemes using enterprise-controlled keys, and tokenization for data at rest and in transit.
Contextual Authentication
Forces additional authentication steps in real-time via integration with identity management solutions based on pre-defined access control policies


Z Services CASB Gateway
Enforces policies with an inline proxy and steers traffic via device agent, proxy chaining, DNS, and identity providers to cover all access scenarios.
Z Services CASB Enterprise Connector
Facilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.
Integration with SIEMs
Collects log files from SIEMs and provides the ability to report on incidents and events from Z Services CASB in SIEM solutions via syslog and API integration.
Integration with EMM/MDM
Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM/MDM certificates.
Z Services CASB Cloud Connector
Connects to cloud services via cloud provider APIs to provide visibility and enforce security and compliance policies for all users and cloud-to-cloud activity.
Integration with On-Premises DLP
Provides integration and closed-loop remediation with existing on-premises DLP solutions such as Symantec, Intel McAfee, and Forcepoint.
Integration with IDM
Leverages identity management (IDM) solutions for pervasive and seamless traffic steering through Z Services CASB Gateway and contextual authentication.
One of our cloud enablement specialists would be delighted to show you Skyhigh in action. Request A Demo

Z Services CASB by Skyhigh is the #1 CASB

Breadth of Functionality
Breadth of Functionality
Only CASB to provide DLP, threat protection, access control, and structured data encryption.
Breadth of Coverage
Breadth of Coverage
Only CASB to cover all users across all devices and support all cloud services, including custom apps on IaaS.
Platform Scalability
Platform Scalability
Only CASB that scales to support 2 billion cloud transactions per day at the world's largest global enterprises
Platform Security
Platform Security
Only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no customer data in our cloud.
Get a personalized assessment of all cloud services in use by your employees and their associated risk. Request A Cloud Audit