Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Coming Soon in Our Next Release

Skyhigh released Skyhigh Security Service Edge 6.7.2 on Oct 10, 2024. For more details, see SSE 6.7.2 Release Notes

► Skyhigh Security Service Edge 6.8.0 Release Timelines (GA on Feb 13 2025 UTC)
Environment Skyhigh Products Release Date
EU
  • Skyhigh CASB
  • Skyhigh Data Loss Prevention
  • Skyhigh Secure Web Gateway Cloud
  • Skyhigh Private Access
  • Skyhigh Cloud Firewall
Feb 06, 2025 UTC
From 2:30 AM UTC for 9 hours approximately
 
Gov Cloud
  • Skyhigh Data Loss Prevention
  • Skyhigh CASB
Feb 28, 2025 UTC 
From 2:30 AM UTC for 9 hours approximately
 
US
  • Skyhigh CASB
  • Skyhigh Data Loss Prevention
  • Skyhigh Secure Web Gateway Cloud
  • Skyhigh Private Access
  • Skyhigh Cloud Firewall
Feb 13, 2025 UTC 
From 2:30 AM UTC for 9 hours approximately
Skyhigh Infrastructure Releases
US Production  PoC Point of Presence (PoP) Skyhigh 6.8.0 Reverse Proxy (Skyhigh CASB) Feb 13, 2025 UTC 
From 4:30 AM UTC for 9 hours approximately
US Production Prod Point of Presence (PoP) Skyhigh 6.7.2 Reverse Proxy (Skyhigh CASB) Feb 13, 2025  UTC 
From 4:30 AM UTC for 9 hours approximately

NOTE: The release dates are published to help you plan your schedule and these dates may vary based on release readiness and other dependency status.

Legends Used

General Availability   GA.png            Limited Availability   LA.png

 

Skyhigh Cloud Platform

Skyhigh Data Loss Prevention (DLP) 

ML-driven Automatic Data Classification GA.png

ML Auto Classifiers automatically detect and classify text and image-based files across sanctioned and shadow/web services, and identify sensitive documents like financial reports, patient records, patents, source code, and ID files across different formats. Security Operations Center (SOC) analysts can use these classifiers to discover real-time sensitive data and apply granular DLP policy controls, enhancing the organization’s data protection strategy and enabling quick and effective responses to data loss incidents. By leveraging AI and machine learning, ML Auto Classifiers improve data governance, support robust DLP policies, streamline management by eliminating manual classification, and enhance operational efficiency. They also offer scalable solutions for large data volumes, provide insights into classification confidence, and minimize false positives and negatives.

Utilize ML Auto Classifiers to categorize sensitive files (Classification page) and review triggered matches along with their confidence levels (Policy Incidents page):

  1. ML Auto Classifier Condition. Use the ML Auto Classifier rule on the Classifications page to automatically classify sensitive files.

    ML Auto Classifiers 1.png
     
  2. ML Auto Classifiers Component. Access the ML Auto Classifiers component on the Sanctioned DLP or Shadow /Web DLP Policy Incident Cloud Card to view the triggered matches for file categories along with their confidence percentages.

    ML Auto Classifiers 2.png   clipboard_e156db7b3cb57076447bdef993ff9b8f5.png
User Unique Identification Number (UID) for DLP Incidents GA.png

The User Unique Identification Number (UID) filter has been introduced for Data Loss Prevention (DLP) incidents to enhance the ability to manage and analyze security incidents within your organization. The User UID is a unique identification number assigned to each user, allowing Security Operations Center (SOC) analysts to obtain a comprehensive view of all DLP incidents linked to a specific user across Sanctioned, Shadow/Web, and Private applications. It enables SOC analysts to take quick and effective remediation action. Additionally, It enhances the organization's data protection strategy and increases operational efficiency in incident management. 

You can access and review specific information related to User UID on the Policy Incidents page.

Capability of User UID on Policy Incidents:

  1. Filter DLP Incidents. Apply the User UID filter on the Policy Incident cloud card to view all DLP incidents associated with a specific User UID directly on the Policy Incidents table.

    User Unique Identification Number (UID) for DLP Incidents 1.png
     
  2. Search for User UIDs. Use the omnibar to search for specific User UIDs. This capability allows for quick access to DLP incidents linked to particular users.
  3. View User UID Column. Include a User UID column in the incident table to generate reports.

    User Unique Identification Number (UID) for DLP Incidents 2.png
ML-Driven Potential False Positive Detection LA.png

ML-based Potential False Positives automatically identify and classify likely false positive DLP incidents, enabling Security Operations Center (SOC) analysts to access detailed statistics and a comprehensive list of these incidents. This capability helps minimize false positives and refine DLP policies, enhancing operational efficiency in incident management. AI-ML Powered Automatic Incident Categorization further streamlines DLP management by using machine learning to identify recurring patterns, reducing investigation time and costs while supporting large incident volumes. It boosts confidence in false positive identification, accelerates response times, and provides insights into trends over the past 30 days, ensuring compliance with data privacy regulations.

You can access and review specific information related to ML-driven potential False Positives on the Policy Incidents page.

Capability of ML-driven Potential False Positives on Policy Incidents:

  1. Potential False Positives Summary. You can view the total count of potential false positive incidents, along with recent trends and changes in their volume. 
  2. Filter for Potential False Positives. Apply the Machine Learning Status filter as Potential False Positive to display all potential false positive incidents within your organization.

    ML-Driven Potential False Positive Detection 1.png
  1. Review and Validate Potential False Positives. The Sanctioned DLP Incident Cloud Card now features a Potential False Positive section within the Machine Learning Status component. This addition allows for efficient validation of incidents classified as potential false positives. 

    ML-Driven Potential False Positive Detection 2.png
Additional DLP Enhancements GA.png
Enhanced File Size Limits for Shadow/Web DLP  Evidence 

Skyhigh has increased the maximum limit for Shadow/Web DLP evidence files from 50 MB to 150 MB. You can now save and download larger evidence files for Shadow/Web DLP incidents using the Shadow/Web DLP Policy Incident Cloud Card or API. This enhancement allows for comprehensive analysis of significant policy violations, facilitating in-depth investigations, and effective remediation of security incidents.

Data Classification Enhancements GA.png
Increased Classification Limit 

Skyhigh has increased the maximum limit for total DLP classifications from 1000 to 2000 per tenant, which includes 82 Skyhigh pre-canned classifications. This expansion enables you to create and manage a wide range of custom classifications, enhancing your ability to meet diverse data protection needs, refine DLP policies, and improve the accuracy of incident detection and response.

Enhanced User Experience in Classification Management

You can now access the Create Classification and Test Classification options directly on the Classifications page, eliminating the need to navigate through the Actions menu. This enhancement streamlines the workflow, making it faster and more intuitive to manage your classifications. 

Enhanced User Experience in Classification Management.png

Skyhigh SSE Products

Skyhigh Secure Web Gateway

Configure System Error Notifications Using Custom Templates GA.png

You can now customize the End User Notification settings for system errors using a custom template. You can view the list of system errors under the System Error Mapping section. You can select the required system error to configure the corresponding end-user notification.

system error mapping.png

Additional Skyhigh Secure Web Gateway Enhancements
Update Imported HTML File

To replace an imported HTML file, click the Edit icon ( ) in the Action menu. If an existing HTML file requires updates, you can upload the revised HTML file to the End User Notification Page. This allows you to view updates via an alert or block notification, including new logos, headers, and template details added to the HTML file.

Update Imported HTML.png

View Referenced Ruleset and Policy Components

Skyhigh Secure Web Gateway provides a Show References option in the Actions section of the List Catalog and Feature Config pages. This feature displays the Rulesets linked to any selected List or Feature Config. When you click Show References, a reference bar appears, listing the names of the associated Rulesets. You can click the hyperlinks for each Ruleset to access and review them. Additionally, when deleting a List or Feature Config, this option helps you identify where that List or Feature Config is used within the Ruleset.

list 1.png

Warning Notification: Selective Traffic Redirection 

A warning message displays when the Redirect only Private Access traffic to cloud check box is selected, stating Redirect only Private Access traffic to cloud. Other traffic wont be redirected. The warning informs that to redirect only Private Access traffic to the cloud, you should check this option. This approach helps ensure that Private Access traffic is directed appropriately to cloud services.

redirect only PA.png

UI Enhancement for HTTP Protocol Ruleset 

The Skyhigh Secure Web Gateway has enhanced usability by improving the flexibility of the HTTP Protocol Preset Rules, now featuring new menu options. These enhancements include two specific HTTP Protocol Preset Rules: Set connection header to closed to block persistent connections and Block chunked transfer encoding between client and proxy

  • Edit List: Modify existing rules.
  • Select Different List: Choose from predefined Ruleset.
  • Create New List: Create custom lists.

    release notes image.png

Remote Browser Isolation

RBI Enhancement: Disable Skyhigh Logo  GA.png

You can now hide the Skyhigh logo while using Full and Risky Isolated browsers. By default, the Skyhigh logo is displayed. Select the Disable Skyhigh logo near browser address bar checkbox to hide the logo.

Disable Skyhigh logo.png

Skyhigh CASB

OCR Support in Microsoft Teams Chats/Channels GA.png

Skyhigh CASB for Microsoft Teams allows security admins to define DLP policies to monitor and remove the sensitive content in images shared in chats/channels by copying and pasting them.

Microsoft Intune Company Portal App Support via Reverse Proxy GA.png

Integrate the Intune Company Portal app with Skyhigh CASB to securely access the organization's resources on personal or company-owned devices like smartphones, tablets, and laptops. By enforcing policies that control how data is accessed, shared, and protected across devices and applications, you can prevent sensitive or confidential data exfiltration, ensuring secure and compliant usage of organizational resources.

Salesforce Winter 2025 Support GA.png

Skyhigh CASB now supports the latest Salesforce Winter 2025 version.

Salesforce-Winter-25-Release.webp

ServiceNow Xanadu Q4 2024 Support GA.png

Skyhigh CASB now supports ServiceNow Xanadu Q4 2024.

Xanadu_Image.png

Filter AI Services by Risk Type GA.png

Use the Artificial Intelligence (AI) Risk Type filter to sort AI services by High, Medium, and Low risk in the Skyhigh Cloud Registry. Sorting AI services by risk type allows you to take necessary actions to strengthen the defense against associated potential risks. SOCs can review and prioritize the AI services and outline remediations quickly, thereby enhancing the ability to secure their most sensitive data from high-risk AI services.

AI_Risk_Column.png

Skyhigh CASB for SAP S/4HANA LA.png

Skyhigh CASB for SAP S/4HANA allows Security Operations Center (SOC) admins to secure and monitor user activities in cloud data and User Authorization Management. Skyhigh aims to secure the registration of SAP S/4HANA business users through certificate-based identifiers for activity monitoring and anomaly detection.

SAP HANA_Selected.png

Skyhigh CASB for Google Chat LA.png

Skyhigh CASB for Google Chat provides comprehensive security, enabling IT teams to monitor and protect sensitive content in chat conversations within your organization. Integrate Skyhigh CASB with Google Chat to monitor risky user activities and apply DLP controls to sensitive file uploads or attachments posted in Google Chat.

Instance_Selected.png

Additional Security Measures for Delta APIs LA.png

Skyhigh CASB Delta API Integration for SharePoint Online/OneDrive now supports the following DLP Policy rules for near real-time DLP on sensitive content uploaded to SharePoint Online and OneDrive services:

  • SharePoint Classification
  • Microsoft Azure Information Protection
  • Seclore Digital Rights Management (DRM)
  • Manual and Bulk Remediation

With the new Delta APIs, Skyhigh provides:

  • Uninterrupted near-real-time DLP
  • Improved DLP policy execution
  • Increased control over high-volume API operations
Custom and Sharable Dashboard LA.png

Dashboards summarize the Shadow and Sanctioned cloud services' data configured in your organization using cards. Now, you can create your dashboards, share them with others in your organization, mark them as favorites for easy access, or set anyone as a home dashboard that appears when you log into the product again. To customize a Dashboard, you can add new cards of different types and reorganize the cards. 

The default set of dashboards such as My Dashboard, Private Access Dashboard, IaaS Dashboard, Office 365 Dashboard, Web Dashboard, and Isolated Web Dashboards are displayed based on the license.

Using custom and sharable dashboards, you can:

  • Share any dashboard of your choice within your organization.
  • Create dashboards from your preferred Saved Views.
  • Access dashboards easily using the PlusIcon_Without Border.pngicon.

Next_Gen_Dashboard.png

Collect Logs in Real Time LA.png

The Log Stream collects near real-time Security Service Edge web access data within your network or feeds directly into your reporting and analytics tools. You can save the logs to a local directory or send them to your third-party SIEM systems (Security Information and Event Management) through a Syslog server. You can use these files to investigate or analyze with Skyhigh SSE.

The Log Stream can:

  • Identify issues as they occur, which helps address problems without delay. 
  • Simultaneously download data originating from different log types such as Secure Web Gateway (SWG), Remote Browser Isolation (RBI), Private Access, and Cloud Firewall. This eliminates running multiple instances to collect data from different log types. A single Enterprise Cloud Connector accommodates downloading multiple log types simultaneously.

Add_New_Configuration_RecentPic.png

User Unification LA.png

User Unification capability uniquely identifies the user across the SSE platform, allowing correlation between users accessing Shadow/Sanctioned services or Web/Private applications. This helps the Security Operations Center (SOC) administrator to perform a comprehensive user threat investigation for a single user.

Skyhigh has introduced User Unification across the SSE platform to facilitate Unified Threat Investigation for each organization user.

Unified Threat Investigation investigates potential threats by cross-referencing activities between SaaS, Shadow, Web, and Private Access data. It increases accuracy in investigating activities or incidents across the SSE platform using single-user identification.

  • Was this article helpful?