Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Coming Soon in Our Next Release

►Skyhigh Security Service Edge 6.7.2 Release Timelines (GA on Oct 10, 2024 UTC)
 
Environment Skyhigh Products Release Date
EU

Skyhigh CASB
Skyhigh Data Loss Prevention
Skyhigh Secure Web Gateway Cloud
Skyhigh Private Access
Skyhigh Cloud Firewall 

Oct 03, 2024 UTC
From 2:30 AM UTC for 9 hours approximately
 
US Gov Cloud Skyhigh Data Loss Prevention
Skyhigh CASB
Oct 04, 2024 UTC
From 2:30 AM UTC for 9 hours approximately
 
US Skyhigh CASB
Skyhigh Data Loss Prevention
Skyhigh Secure Web Gateway Cloud
Skyhigh Private Access
Skyhigh Cloud Firewall 
Oct 10, 2024 UTC
From 2:30 AM UTC for 9 hours approximately
Skyhigh Infrastructure Releases
US Production  PoC Point of Presence (PoP) Skyhigh 6.7.2 Reverse Proxy (Skyhigh CASB) Oct 17, 2024 UTC
From 4:30 AM UTC for 9 hours approximately
US Production Prod Point of Presence (PoP) Skyhigh 6.7.1 Reverse Proxy (Skyhigh CASB) Oct 24, 2024 UTC
From 4:30 AM UTC for 9 hours approximately

NOTE: The release dates are published to help you plan your schedule and these dates may vary based on release readiness and other dependency status.

Legends Used

General Availability   GA.png            Limited Availability  LA.png

Skyhigh Cloud Platform

Skyhigh Data Loss Prevention (DLP)

Enhanced Proximity Condition in Classifications GA.png
  1. The proximity condition in the Classification editor now includes a new option named Match Criteria Settings.

    Enhanced Proximity Condition in Classifications 1.png
     
  2. Use the Match Criteria Settings option to configure the settings and view an example of the match criteria for your proximity rule. 
    1. Select Match Criteria. Enables you to define the settings for the match criteria to trigger unique and non-unique proximity matches.

      Enhanced Proximity Condition in Classifications 2.png
       
    2. Example of Match Criteria. Displays a real-time example of proximity matches, updated based on the settings selected in the Select Match Criteria cloud card.

      Enhanced Proximity Condition in Classifications 3.png
       

Security Operations Center (SOC) administrators can leverage this setting to control how match strings are paired between the criteria of the proximity rule for unique or non-unique proximity matches. It enables them to define proximity classifications with flexible match criteria, including keyword validation. Organizations can use the improved proximity condition to migrate their DLP policies with proximity conditions from data identifiers to classifications quickly and easily. It also helps to increase confidence, reduce false positives, and enhance operational efficiency in data classification.  

View Classification and Sanctioned DLP Policy Events in the Audit Log GA.png
  1. The Audit Log page now provides visibility into DLP events for classifications (advanced pattern and dictionary) and sanctioned DLP policies. 
  2. Use the DLP Classifications and CASB DLP Policy event categories to track DLP events, such as the creation, modification, and deletion of advanced patterns, dictionaries, and sanctioned DLP policies by users within your organization. 
  3. View details about the DLP events for advanced patterns, dictionaries, and sanctioned DLP policies based on the selected event type:
    1. DLP Classification Events
      • Classification Advanced Pattern created 
      • Classification Advanced Pattern deleted 
      • Classification Advanced Pattern updated 
      • Classification Dictionary created 
      • Classification Dictionary deleted 
      • Classification Dictionary updated

        View DLP Classification and Sanctioned DLP Policy Events in the Audit Log 1.png

         
    2. Sanctioned DLP Policy Events
      • Assigned jurisdiction to CASB DLP Policy
      • CASB DLP Policy Rule or Exception Group updated
      • CASB DLP Policy activated
      • CASB DLP Policy created
      • CASB DLP Policy de-activated
      • CASB DLP Policy deleted
      • CASB DLP Policy exported
      • CASB DLP Policy updated
      • DLP Dictionary created
      • DLP Dictionary deleted
      • DLP Dictionary updated

        View DLP Classification and Sanctioned DLP Policy Events in the Audit Log 2.png


Security Operations Center (SOC) analysts can gain insights into the DLP events for advanced patterns, dictionaries, and sanctioned DLP policies to identify the users that trigger DLP events and track the changes in classifications and sanctioned DLP policies that impact their DLP policies. It helps SOC administrators identify and investigate any unauthorized or malicious activity related to classification and policy management. These capabilities enable SOC admins to improve their organization's data protection strategy, reduce the risk of data exfiltration, and maintain regulatory compliance. 

Additional DLP Improvements GA.png
AI Regular Expression Generator

Skyhigh has upgraded its AI-powered regular expression (RegEx) generator for Custom Advanced Patterns. The enhanced AI RegEx generator now features an advanced AI model to handle complex queries and provide accurate responses for regular expressions. It enables you to quickly and efficiently generate regular expressions for Custom Advanced Patterns. This upgrade also improves the user experience and addresses critical issues.

Enhanced AI Regular Expression Generator.png

Support for Classifications and OCR in GovCloud (FedRAMP)

Skyhigh DLP key features such as Classifications and Optical Character Recognition (OCR) are now supported on the GovCloud (FedRAMP) environment. This enhancement enables organizations to identify, classify, and protect sensitive data more efficiently, ensuring compliance with federal regulations and reducing the risk of data breaches.

Note: To enable classifications for existing GovCloud (FedRAMP) tenants, contact Skyhigh Support.

Naming Convention for Full Web DLP Evidence File Name 

Skyhigh has updated the naming convention for the full Web DLP evidence file name to accurately reflect the HTTP method used in the web request. Previously, when you downloaded the saved evidence files or match highlight files for Shadow/Web DLP policy incidents using the Retrieve Incidents API, the full evidence file name was generic (request.post.txt) at the top level, regardless of the actual HTTP method (GET, PUT, PATCH) used in the captured web request.

The enhanced naming convention for the full Web DLP evidence file name provides you with clearer context and enables you to identify specific evidence files for Shadow/Web DLP policy incidents quickly and easily during investigations.

ML Auto Classifiers LA.png
  1. The Classifications page now includes ML Auto Classifiers to automatically detect and classify various types of sensitive files in sanctioned and shadow/web services.

    ML Auto Classifiers 1.png
     
  2. It displays the matches triggered by various ML Auto Classifiers and their confidence percentage on the Sanctioned DLP Policy Incident Cloud Card.

    ML Auto Classifiers 2.png
     
  3. ML Auto Classifiers simplify the process of identifying and categorizing sensitive data by providing the following benefits.
ML Auto Classifier Benefits
AI-ML Powered Automatic Data Classification. Automatically classifies files with sensitive data such as PII, financial records, healthcare records, and intellectual property using AI and ML models.
Comprehensive Categorization. Utilizes AI and ML to automatically categorize data across all exfiltration vectors, enhancing data governance.
Robust Policy Framework. Leverages the categories and subcategories for ML Auto Classifiers within the policy framework to build robust DLP policies.
Simplified DLP Administration. Streamlines DLP management by eliminating the need for manual data classification.
Enhanced Operational Efficiency. Significantly boosts operational efficiency in incident management.
Scalability. Provides flexible scalability to support large data volumes across standard file formats. 
Confidence. Offers clear insights into the confidence percentage in data classification, reducing the risk of data breaches.
Risk Reduction. Minimize the risk of inaccurate matches, preventing false positives/negatives.
Enhanced Visibility for Sanctioned DLP Incidents LA.png

Skyhigh now provides a focused view and a preferred view for easy and quick visibility into all relevant sanctioned DLP policy incidents within your organization.

Focused View
  1. The Policy Incidents page now includes a Focused View for sanctioned DLP policy incidents.

    Enhanced Visibility for Sanctioned DLP Incidents 1.png
     
  2. It automatically displays incidents based on predefined filters such as incident status (new, opened).

    Enhanced Visibility for Sanctioned DLP Incidents 2.png
     
  3. The focused view simplifies the task of viewing all the critical incidents by providing the following benefits. 
Focused View Benefits
Automatic Incident Prioritization. Automatically highlights high-priority incidents that can be potential threats or anomalies.
Rapid Incident Response. Quicker response time for vulnerable incidents, such as the latest and unresolved incidents.
Reduced Noise. Minimizes the volume of irrelevant incidents, such as old and resolved incidents in the incident list.
Actionable Insights. Provides actionable insights to accelerate the incident remediation process, such as blocking access, quarantining files, or notifying users.
Enhanced User Experience. Set the focused view as your preferred view for the Policy Incidents page.
Trends and Analytics. Includes visualizations of priority DLP incidents to monitor trends or patterns in policy breaches over time.
Streamlined DLP Administration. Streamlines DLP management by reducing fatigue, investigation time, and costs in SOC operations.
Compliance Adherence. Ensures compliance with data privacy regulations and industry standards. 
Default View

Skyhigh now provides the flexibility to select a default view. You can select a default view for sanctioned DLP policy incidents via the Policy Settings or the Policy Incidents page. The default view enables you to display the preferred sanctioned DLP policy incidents on the Policy Incidents page. You can set the focused view, Skyhigh recommended view, or last used view as your default view for the Policy Settings page.

Security Operations Center (SOC) administrators can leverage the default view to gain actionable insights into specific policy incidents and perform additional forensics on the generated incidents. It allows SOC admins to monitor and manage policy violations efficiently. Organizations can use the default view to enhance user experience, improve their data protection strategy, and streamline operational efficiency in incident management.

Enhanced Visibility for Sanctioned DLP Incidents 3.png

Skyhigh SSE Products

Skyhigh Secure Web Gateway

End User Notification Page - Coaching Page Support   GA.png

The Coaching page deployment now supports templates created through the End User Notification page feature. You can apply templates designed with the End User Notification page feature to the Coaching page. Additionally, templates customized via the UI template builder on the End User Notification page can be utilized while working with the Coaching page. To configure the coaching page, clone the coaching activation template from the Skyhigh Default tab and make modifications as required.

Coaching page.png

Support for Custom Trusted Certificate  GA.png

Skyhigh Web Gateway previously used a self-signed certificate from Skyhigh to block messages on sites in the SSL Bypass List. Still, it will now use a certificate from a customer-configured HTTPS Connection feature for these messages. This change addresses issues such as certificate errors encountered with websites that fail to recognize the Skyhigh-signed certificates. For SSL decryption, you now need to select the HTTPS Connection feature configuration, specifically Customer_CA in this case.

Review Changes before publish - Iterative Enhancements GA.png

This installment of iterative enhancements offers comprehensive visibility into user modifications. Instead of a generic Modified label, you now get detailed views of all changes, including additions, deletions, and modifications.

Review changes.png

Detailed Insights via Expandable Side Panel  GA.png

Skyhigh Web Gateway supports a side panel for Web Users, Web Traffic, Web Malware, and Isolated Site pages. Click on a row to open a side panel displaying details for all fields, including events, traffic, and usage trends. The panel is expandable and collapsible, ensuring a user-friendly experience even with many fields.

SIDE PANEL1.png

Progress Bar and Ruleset Reference Checks GA.png

Skyhigh Web Gateway includes a progress bar for deleting lists and feature configurations. When deleting a list, the system checks for references in rulesets to prevent disruptions in policy execution. The progress bar shows the status while the system searches for these references. A list can only be deleted if it is not referenced in any ruleset.

Progress bar 1.1.png

Rule Trace Enhancements  LA.png

Rule tracing facilitates the tracking of the path taken when evaluating a policy for a user, as well as the rule or ruleset that was assessed to determine whether to allow or block a request. You can obtain the logs through rule tracing and view the path that the traffic traversed in the web policy tree. You can then use the rule tracing logs for troubleshooting. The Rule Tracing page now displays details including Username, Smartmatch Filter, Region, Session ID, and Timestamp. Contact Skyhigh Support for more information.

Rule Tracing.png

Remote Browser Isolation

Control Parameters in Policy UI for Streamlined Policy Management GA.png

RBI capabilities previously available only through policy code are now included in the policy UI. New options allow administrators to enable read-only websites, disable the RBI password manager for login sites, and block web page printing. These features provide administrative control ensuring threat protection during full and remote isolated sessions.

RBI latest.png

Skyhigh Private Access

Secure App Connector V2 Stickiness GA.png 

In a scenario with multiple connectors in a group, enabling this UI toggle ensures that traffic is routed through a randomly selected connector, maintaining consistent user session routing.

Screenshot (455)_1.png

Extending Network Level Access to Support UDP-Based Applications GA.png 

Private Access now extends support to relevant use cases fulfilled by traditional VPNs using Network Level Access (NLA) by securely opening the network like a VPN but based on zero trust principles for UDP-based applications. NLA supports network types such as subnet, IP, and domain wildcards in addition to domains, enabling easy migration from legacy VPNs. 

Screenshot (462)_12.png

Skyhigh CASB

New Artificial Intelligence Risk Tab on the Cloud Registry GA.png

A new Artificial Intelligence risk tab is introduced in the Cloud Registry to capture AI-related risks of a cloud service. All the LLM risk attributes are now captured under the Artificial Intelligence risk tab.

Artificial_Inteligence_Tab.png

Skyhigh Domain Unification to Support Chrome/Edge Browsers LA.png

Skyhigh Security unified different domains operating under the Skyhigh console (Dashboard) to a single domain, named skyhigh.cloud to mitigate the ability of websites to misuse the cross-site tracking. Implementing this change will seamlessly enhance the user experience with the product on the Chrome/Edge browser.

After unifying to a single domainwhen you use the Skyhigh console, you will be directed to the domains under skyhigh.cloud instead of myshn.net or myshn.eu. Now, all the components in the Skyhigh console work under a single domain, the skyhigh.cloud.

NOTE: Currently, no action is needed from your end. Stay tuned for more details on the scheduled date and the required actions.

  • Was this article helpful?