Story image

McAfee completes acquisition of SkyHigh Networks

08 Jan 2018

McAfee has announced the completion of its acquisition of Skyhigh Networks.

With the close of this deal, Skyhigh Networks becomes part of the McAfee Cloud Security Business Unit.

Skyhigh is an ideal complement to McAfee’s strategy of building and optimising mission-critical cybersecurity environments for the future.

Skyhigh Networks pioneered the cloud access security broker (CASB) market segment that analysts describe as one of the fastest growing areas of information security investments of the last five years.

With this technology, McAfee now offers a cloud portfolio that addresses the three primary challenges of managing multi-cloud environments—visibility into networks, workloads and data, advanced threat protection and pervasive data protection.

 “This announcement marks a new milestone for the future of our company,” says McAfee chief executive officer Chris Young.

“We are focused on securing customers from their devices to the cloud, giving customers access to market-leading capabilities in the architectural control points that matter most.”

According to McAfee’s 2017 cloud adoption and security report, Building Trust in a Cloudy Sky, 93% of organisations use some form of cloud services.

McAfee cloud security solutions provide visibility, advanced threat protection, and data protection controls across all clouds to secure network traffic, workloads, and data.

The multi-cloud security management of Skyhigh Security Cloud (Skyhigh), McAfee Cloud Workload Security (McAfee CWS) and McAfee Virtual Network Security Platform (McAfee vNSP) allows administrators to identify and secure critical cloud resources.

“McAfee’s acquisition of Skyhigh Networks brings two security leaders together,” says Carlson Wagonlit Travel Information Security manager and McAfee customer Ivaylo Uzunov.

“The integration of their security offerings will provide a holistic data visibility and control for cloud applications while preserving policy enforcement and compliance.”

Skyhigh Networks’ portfolio includes visibility into content, context and user activity across SaaS, PaaS and IaaS environments.

It also offers advanced controls and automation to correct policy violations in cloud services; leverages data science and network effects across billions of events to identify and stop threats; applies protection to data that persists in the cloud or outside the cloud; and delivers an extensible platform for cloud providers to enable Skyhigh controls for their SaaS applications, and enterprises to enable controls for custom applications developed in-house.

As part of the acquisition, Skyhigh Networks CEO Rajiv Gupta will become part of McAfee’s leadership team and will help to run McAfee’s new cloud business unit. 

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.