Story image

McAfee completes acquisition of SkyHigh Networks

08 Jan 18

McAfee has announced the completion of its acquisition of Skyhigh Networks.

With the close of this deal, Skyhigh Networks becomes part of the McAfee Cloud Security Business Unit.

Skyhigh is an ideal complement to McAfee’s strategy of building and optimising mission-critical cybersecurity environments for the future.

Skyhigh Networks pioneered the cloud access security broker (CASB) market segment that analysts describe as one of the fastest growing areas of information security investments of the last five years.

With this technology, McAfee now offers a cloud portfolio that addresses the three primary challenges of managing multi-cloud environments—visibility into networks, workloads and data, advanced threat protection and pervasive data protection.

 “This announcement marks a new milestone for the future of our company,” says McAfee chief executive officer Chris Young.

“We are focused on securing customers from their devices to the cloud, giving customers access to market-leading capabilities in the architectural control points that matter most.”

According to McAfee’s 2017 cloud adoption and security report, Building Trust in a Cloudy Sky, 93% of organisations use some form of cloud services.

McAfee cloud security solutions provide visibility, advanced threat protection, and data protection controls across all clouds to secure network traffic, workloads, and data.

The multi-cloud security management of Skyhigh Security Cloud (Skyhigh), McAfee Cloud Workload Security (McAfee CWS) and McAfee Virtual Network Security Platform (McAfee vNSP) allows administrators to identify and secure critical cloud resources.

“McAfee’s acquisition of Skyhigh Networks brings two security leaders together,” says Carlson Wagonlit Travel Information Security manager and McAfee customer Ivaylo Uzunov.

“The integration of their security offerings will provide a holistic data visibility and control for cloud applications while preserving policy enforcement and compliance.”

Skyhigh Networks’ portfolio includes visibility into content, context and user activity across SaaS, PaaS and IaaS environments.

It also offers advanced controls and automation to correct policy violations in cloud services; leverages data science and network effects across billions of events to identify and stop threats; applies protection to data that persists in the cloud or outside the cloud; and delivers an extensible platform for cloud providers to enable Skyhigh controls for their SaaS applications, and enterprises to enable controls for custom applications developed in-house.

As part of the acquisition, Skyhigh Networks CEO Rajiv Gupta will become part of McAfee’s leadership team and will help to run McAfee’s new cloud business unit. 

Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.