Skyhigh supports the cloud adoption lifecycle so companies can enable cloud services that drive their innovation and growth without compromising security, compliance, or governance. As such, their Cloud Security Manager enables IT divisions within enterprises to embrace, enable, and accelerate the cloud services they need to safely drive productivity and innovation in their business. Skyhigh provides visibility, usage analytics, and policy enforcement. To enhance the security of these endeavors, Skyhigh Cloud Security Platform integrates with SafeNet Luna SA Hardware Security Module (HSM) and SafeNet KeySecure to provide a secure, encrypted, cloud gateway solution.
SafeNet integrates with Skyhigh’s Cloud Security Platform, which transparently enforces policies such as encryption, data loss prevention, and contextual access control, and enables smooth mobile-to-cloud access to cloud services. SafeNet has two offerings for Skyhigh Networks customers: SafeNet Luna SA HSM and SafeNet KeySecure for a more secure cloud environment.
Skyhigh Networks: Cloud Encryption Gateways with SafeNet1601 S De Anza Blvd, Suite 248Cupertino,
California 95014United States
Main Phone: 1.866.727.8383
Skyhigh Secure: Cloud Encryption Gateways with SafeNet Luna SA and SafeNet KeySecure
Skyhigh Secure enables cloud usage and provides storage and services that reduce risk. For customers using cloud services such as AWS CloudHSM, Skyhigh Cloud Security Platform can function as a key brokering and distribution provider that enables the secure deployment and retrieval of keys for encryption services across multiple cloud service providers. SafeNet HSM appliances act with Skyhigh in a key broker role to manage key exchanges, enhance performance, and support application layer encryption.
Additionally, Skyhigh Secure encryption gateways integrate with on-premise SafeNet KeySecure deployments via the KMIP standard. Skyhigh Secure provides customers with flexible deployment options via an on-premise gateway, a cloud-hosted gateway, and a hybrid offering. In all of these deployment options, customers store and manage their own keys in an optimized and secured key distribution method within KeySecure.
Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto
or to be contacted by a Gemalto specialist.
By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.