Z Services Cloud
Access Security Broker

Salesforce

Prevent data loss due to insider threats and compromised accounts and protect data to meet stringent regulatory compliance and data privacy requirements

Detect internal and external threats to data in Salesforce

Z Services CASB Threat Protection analyzes user activity in Salesforce across multiple heuristics, detects threats, and automatically takes risk-mitigating action. The built-in threat resolution workflow provides a complete audit trail of all user activity to support forensic investigations. As threats are resolved, Z Services CASB automatically incorporates this data into its behavioral models to improve detection accuracy.

Insider and privileged user threats

Z Services CASB’s machine learning algorithms model typical behavior for a user, group, and time period to detect negligent and malicious behavior, such as an employee downloading sales contacts before leaving for a competitor. The solution also identifies privileged users viewing data outside of their role, degrading security settings, and creating dummy accounts for third-party access.

Compromised accounts

Z Services CASB identifies compromised accounts based on consecutive login attempts from two locations in a time period implying impossible travel, login attempts from untrusted locations, and brute force login attempts. The solution also identifies user credentials for sale on the Darknet, revealing accounts at high-risk of compromise to support targeted password update reminders.

Encrypt structured and unstructured data

Z Services CASB enables enterprises to protect structured and unstructured data leveraging Salesforce’s native 256- bit AES encryption. Z Services CASB integrates with KMIP- compliant key management solutions, on-premises or in the cloud, to broker the use of enterprise-controlled encryption keys across multiple Salesforce instances.

Encrypt structured and unstructured data

Secure BYOD access to Salesforce

Z Services CASB enforces fine-grained access policies, such as allowing contact lookup on unmanaged devices but preventing report downloads to devices without appropriate endpoint security. Z Services CASB can also integrate with rights management solutions and apply IRM protection to files downloaded from Salesforce so that data is protected anywhere.

Enforce data loss prevention policies

Z Services CASB enforces DLP policies across data at rest and in motion in standard and custom fields, files, and Chatter posts. Remediation options include user coaching, block, encrypt, administrator notification, and delete. Z Services CASB supports pre-built, industry-specific DLP templates and custom policies based on data identifiers, keywords, user groups, and regular expressions. Policy Violation Management provides a unified interface for reporting with a highlighted excerpt revealing the exact content that triggered the DLP violation.

Enforce data loss prevention policies

KEY FEATURES

COMPLIANCE

Cloud Data Loss Prevention
Enforces DLP policies based on data identifiers, keywords, and structured/unstructured fingerprints across standard and custom fields, files, and Chatter posts.
Policy Violation Management
Offers a unified interface to review DLP violations, including content that triggered the violation, with remediation workflow.
Structured Data Fingerprinting
Fingerprints billions of unique values stored in enterprise databases and systems of record and supports exact match detection of each value.
Pre-Built DLP Templates
Provides out-of- the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.
Multi-Tier Remediation
Provides coach user, notify administrator, block, apply rights management, quarantine, tombstone, and delete options and enables tiered response based on severity.
Match Highlighting
Displays an excerpt with content that triggered a violation. Enterprises, not Skyhigh, store excerpts, meeting stringent privacy requirements.
Unstructured Data Fingerprinting
Fingerprints sensitive files and detects exact match and partial or derivative matches with a policy-defined threshold for percentage similarity to the original.
Closed-Loop Policy Enforcement
Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.
Match Highlighting
Displays an excerpt with content that triggered a DLP violation. Enterprises, not Z Services CASB, store excerpts, meeting stringent privacy requirements.

THREAT PROTECTION

Salesforce SOC
Delivers a threat dashboard and incident-response workflow to review and remediate insider threats, privileged user threats, and compromised accounts.
User Behavior Analytics
Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.
Privileged User Analytics
Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.
Guided Learning
Provides an adjustable sensitivity scale for each anomaly type with real-time preview showing the impact of a change on anomalies detected by the system.
Cloud Activity Monitoring
Provides a comprehensive audit trail of all user and administrator activities to support post- incident investigations and forensics.
Account Compromise Analytics
Analyzes login attempts to identify impossible cross-region access, brute-force attacks, and untrusted locations indicative of compromised accounts.
Malware Protection
Identifies all users and groups accessing Salesforce and reveals which users are accessing sensitive data.
Coaching and Enforcement
Displays just-in- time coaching messages guiding users from unapproved services to Salesforce and enforces granular policies such as read-only access.
User Groups
Discovers and groups users from directory services and Salesforce. User groups can be leveraged for analytics and policy enforcement.

GOVERNANCE

Shadow IT Discovery
Discovers all shadow IT cloud services employees are using in place of the corporate standard, OneDrive, Yammer, and SharePoint.
On-Demand Data Scan
Identifies sensitive data stored at rest in Office 365 with the ability to target scans based on date range, user, sharing status, and file size.
Coaching and Enforcement
Displays just-in- time coaching messages guiding users from unapproved services to Office 365 and enforces granular policies such as read-only access.
Collaboration Analytics
Visually summarizes sharing with third-party business partners, personal emails, and internal users and reports on policy exceptions.

DATA SECURITY

Security Configuration Audit
Discovers current Salesforce security settings and suggests modifications to improve security based on industry best practices.
Contextual Authentication
Forces additional authentication steps in real time via integration with identity management solutions based on pre-defined access control policies.
Contextual Authentication
Forces additional authentication steps in real-time via integration with identity management solutions based on pre-defined access control policies.
Encryption Key Brokering
Integrates with enterprise key management solutions to broker the management and rotation of enterprise encryption keys across multiple Salesforce instances.
Contextual Access Control
Enforces policies based on user, managed/unmanaged device, and geography with coarse and activity-level enforcement.
Encryption and Tokenization
Delivers peer-reviewed, function-preserving encryption schemes using enterprise-controlled keys, and tokenization for structured and unstructured data.
Information Rights Management
Applies rights management protection to files uploaded to or downloaded from Salesforce, ensuring sensitive data is protected anywhere.

platform

Skyhigh Gateway
Provides a streamlined user interface and embedded workflows for four distinct personas: governance, compliance, security, and executive.
Skyhigh Enterprise Connector
Facilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.
Integration with Key Management Systems
Seamlessly integrates with your existing key management systems using KMIP to encrypt data with enterprise-controlled keys.
Integration with EMM/MDM
Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM/MDM certificates.
Skyhigh Cloud Connector
Connects to cloud services via cloud provider APIs to provide visibility and enforce security and compliance policies for all users and cloud-to- cloud activity.
Integration with SIEMs
Collects log files from SIEMs and provides the ability to report on incidents and events from Skyhigh in SIEM solutions via syslog and API integration.
Integration with IDM
Leverages identity management (IDM) solutions for pervasive and seamless traffic steering through Skyhigh’s proxy and contextual authentication.
One of our cloud enablement specialists would be delighted to show you Skyhigh in action. Request A Demo

Z Services CASB by Skyhigh is the #1 CASB

Breadth of Functionality
Breadth of Functionality
Only CASB to provide DLP, threat protection, access control, and structured data encryption.
Breadth of Coverage
Breadth of Coverage
Only CASB to cover all users across all devices and support all cloud services, including custom apps on IaaS.
Platform Scalability
Platform Scalability
Only CASB that scales to support 2 billion cloud transactions per day at the world's largest global enterprises
Platform Security
Platform Security
Only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no customer data in our cloud.
Get a personalized assessment of all cloud services in use by your employees and their associated risk. Request A Cloud Audit