SHARE
Facebook X Pinterest WhatsApp

Compliance Management Gets Streamlined with Skyhigh Secure

Top Ten PCI Compliance Services, July 2013 IT organizations are being asked to police policies they didn’t create, which naturally causes a lot of frustration because they lack the tools to actually accomplish the job. Skyhigh Networks has announced the availability of Skyhigh Secure, a cloud service that promises to greatly simplify the management of […]

Written By
MV
Mike Vizard
Aug 13, 2013
Slide Show

Top Ten PCI Compliance Services, July 2013

IT organizations are being asked to police policies they didn’t create, which naturally causes a lot of frustration because they lack the tools to actually accomplish the job.

Skyhigh Networks has announced the availability of Skyhigh Secure, a cloud service that promises to greatly simplify the management of compliance, which will make IT’s job a little bit easier.

According to Skyhigh Networks CEO Rajiv Gupta, Skyhigh Secure is specifically designed to give IT organizations tools to manage access control, application auditing, encryption and data loss prevention (DLP) that encompass mobile, cloud and traditional enterprise applications wherever they reside.

As a service, Skyhigh Secure is based on software that monitors Domain Name System (DNS) traffic as it comes through an Internet exchange service provided by Equinix, which is where the Skyhigh Secure service is actually hosted. That approach not only makes it easier to deploy Skyhigh Secure, Gupta says it creates an authentication architecture based on the Security Assertion Markup Language (SAML) that makes it impossible for end users to do an end run around compliance policies because all Web traffic for the organization is now routed through the Equinix exchange.

Without having to rely on deploying agent software on the client, Gupta adds that IT organizations can develop a baseline of application usage that will make it easier to identify any anomalies in patterns of usage for any particular application.

Ultimately, Gupta says the role of IT should be more focused on enablement than on compliance. But as it stands, in most organizations end users routinely use services that violate compliance policies, and they often wind up paying for capabilities that the organization has already contracted to deliver via another cloud service.

IT compliance issues are similar to the way police forces are asked to enforce ordinances created by city councils—in reality IT doesn’t have the tools or bandwidth to actually accomplish that, in much the same way police forces may not have the proper tools or staff to enforce a wide-reaching ordinance. And though it may come in handy to have that ordinance on the books, in reality the actual ordinance does little to change behavior. The good news is that at least from an IT perspective, the tools for enforcing  compliance regulations are starting to catch up to the job that IT organizations are tasked with performing.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Strategies for Successful Data Migration
Kashyap Vyas
May 25, 2022
Leveraging AI to Secure CloudOps as Threat Surfaces Grow
ITBE Staff
May 20, 2022
The Emergence of Confidential Computing
Tom Taulli
Apr 20, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.