SKYHIGH NETWORKS in Encryption Software

Are you from this Company?
SKYHIGH NETWORKS
California, USA
2012
$11MN to $50MN
Enterprise
10 Likes
65 Buyers Negotiating

Summary

Skyhigh Networks provides Cloud encryption that helps businesses in securing corporate data in the cloud against security breaches, third-party disclosures, and compliance violations.

Features:
Standards-Based Encryption - The solution applies standards-based AES encryption to structured and unstructured data by making use of enterprise-owned encryption keys.
Preserve Application Functionality - It also provides function preserving encryption schemes that are academia and peer-reviewed
Tokenization - Cloud Encryption substitutes sensitive data with random tokens to keep data on premises.
Key Management Support - Offers cloud or on-premise deployment options and collaborates with leading key management servers supporting the KMIP protocol.

Discussions

Strengths
  • +12
    Professional Services
  • +5
    Consulting Service
  • +14
    Support and Maintenance
  • +6
    Training and education
  • +9
    On-Site Support
  • +10
    Remote Support
  • +9
    AES
  • +10
    IaaS
  • +9
    PaaS
  • +8
    SaaS
  • +7
    Large Enterprises
  • +10
    Cloud
  • +14
    Directly
  • +5
    Through Partners / Third-Party Vendors
  • +12
    Cloud Encryption
  • +13
    Data Encryption
  • +8
    SMEs
  • +6
    Application-level encryption
  • +7
    Column-level encryption
  • +11
    Data-in-motion encryption
Cautions
  • -13
    Managed Services
  • -10
    Customer Redressal Mechanism/Program
  • -9
    Level of Support
  • -10
    Patented inhouse algorithm
  • -9
    On-Premise
  • -11
    Communication Encryption (Voice email, and message)
  • -10
    Database and Application Encryption
  • -14
    Data Loss Prevention
  • -8
    Disk Encryption
  • -9
    File/Folder Encryption
  • -6
    Key Management
  • -5
    Tokenization
  • -7
    Others
  • -8
    Application-level tokenization
  • -12
    Data-at-rest encryption
  • -13
    Data-in- process/use encryption
  • -14
    Virtual machine instance encryption
  • -11
    Others (RSA, Blowfish, DES)
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup