How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We use this solution as a CASB, a Cloud Access Security Broker, to gain insight into our cloud environment. We integrate this solution for our clients as a companion service to our main cloud product.
The primary use case is to prevent employees from extracting the data out of their corporate system and getting them outside through Gmail and things like that.
We use it for cloud risk services.
We use it to discover, protect, and permit. Skyhigh for Shadow IT provides us visibility into the Shadow IT. It helps us in blocking high risk services and also in containing the data exfiltration to these high risk services.